StackHawk Documentation StackHawk Logo HawkDocs

No results found

Try different keywords or check your spelling

Search documentation

Find guides, API references, and more

esc
Back to Index

Possible Broken Function Level Authorization

Reference
Plugin ID: 422003 High Active

Remediation

To mitigate the vulnerability of Broken Function Level Authorization in an OpenAPI specification, consider the following steps:

  1. Implement Proper Access Controls: Enforce proper authorization checks at each function level in your API. In the OpenAPI spec, use security schemes to define role-based access. For example, define OAuth2 scopes for different roles and ensure that each endpoint checks for the appropriate scope.

    securitySchemes:
      OAuth2:
        type: oauth2
        flows:
          implicit:
            authorizationUrl: https://example.com/oauth/authorize
            scopes:
              admin: Admin access
              user: User access
    paths:
      /admin/data:
        get:
          security:
            - OAuth2: [admin]
  2. Use a Centralized Authorization Mechanism: Implement a centralized system for managing user roles and permissions. In your API, reference this system to validate roles and permissions before processing requests.

  3. Perform Thorough Testing: Conduct comprehensive testing for different user roles and scenarios. Utilize automated tools that can simulate requests with varying authorization levels to ensure that each endpoint properly enforces access controls.

  4. Regularly Review and Update Access Controls: Continuously monitor and update the access control mechanisms in your API spec to reflect changes in user roles and application functionality.

About

Broken Function Level Authorization occurs when an application fails to enforce access controls at the function level, allowing unauthorized users to access sensitive actions or administrative endpoints. This vulnerability can be exploited by attackers through HTTP request manipulation or endpoint guessing.

Risks

The risks of Broken Function Level Authorization include unauthorized access to sensitive actions, elevation of privileges, data exposure, and compliance violations. It's vital to implement and maintain robust access controls at the function level to protect against these risks.

Your privacy settings

We use first and third party cookies to ensure that we give you the best experience on our website and in our products.