StackHawk Documentation StackHawk Logo HawkDocs

No results found

Try different keywords or check your spelling

Search documentation

Find guides, API references, and more

esc
Back to Index

API Active IDOR Validation

Reference
Plugin ID: 40056 CWE: 639 WASC: 2 High Active Access Control

Remediation

To mitigate Active IDOR vulnerabilities, implement the following security measures:

  1. Indirect Object References: Use indirect object references instead of direct identifiers to prevent predictable ID manipulation.

  2. Authorization Validation: Implement proper authorization checks before allowing access to any resource referenced by an ID.

  3. Session-Based Access Control: Validate that users can only access objects that belong to their session or account.

  4. ID Randomization: Use randomized, non-sequential identifiers to make ID prediction more difficult for attackers.

About

Active IDOR (Insecure Direct Object Reference) validation actively tests for vulnerabilities where applications expose direct references to internal objects. This allows attackers to manipulate parameters to access unauthorized data.

Risks

Active IDOR vulnerabilities can result in:

  • Unauthorized access to user data and resources
  • Horizontal and vertical privilege escalation
  • Data enumeration and information disclosure
  • Privacy violations and data breaches
  • Manipulation of objects belonging to other users

Your privacy settings

We use first and third party cookies to ensure that we give you the best experience on our website and in our products.