appsec.fyi

A somewhat curated list of links to various topics in application security.

Insecure Direct Object Reference (IDOR)

LinkExcerptWord Count
IDOR - how to predict an identifier? Bug bounty case studyšŸ“š Access full case study here: https://members.bugbountyexplained.com/how-to-make-money-with-idors-idor-case-study/ šŸ“–Ā Check out AppSecEngineer, the sponsor of today's video: https://www.appsecengineer.com šŸ“§ Subscribe to BBRE Premium: https://bbre.dev/premium āœ‰ļø Sign up for the mailing0
devanshbatham/Vulnerabilities-UnmaskedThis repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand! Imagine you have a toy box where you and your friends can put your favorite toys in and take them out whenever you want. Each of you can only take out your own toys.3169
šŸ‘©ā€šŸ’»Roadmap to Cybersecurity in 2022, Full-Read SSRF, IDOR in GraphQL, GCP Pentesting, and muchā€¦Watch this talk about $25 billion+ of value, locked in the practical attacks against bridges. Welcome to the #IWWeekly28 ā€” the Monday newsletter that brings the best in Infosec straight to your inbox.737
Blog DetailsExploiting IDORs - A compilation of some neat, new and crazy examples! Hello readers, in this blog, our Senior Consultant Vanshal Gaur, is going to explain access control and vulnerabilities arising from insecure access control such as Insecure Direct Object References (IDOR) with some interesting2841
Finding more IDORs ā€“ Tips and TricksBefore working in the Security Testing team at Aon, I set myself the goal of receiving a bug bounty from a public vulnerability disclosure program. As is often recommended, I decided to look for one bug class in as many places as possible.2004
All About IDOR AttacksHave you ever wondered how data breaches happen? Nowadays, it seems like a new company is breached every five minutes.1140
HTTP Request Smuggling + IDORHTTP Request Smuggling or HTTP Desync is one of the trendy vulnerabilities of the moment and one of my favorites, because it allows you to greatly increase the severity of most common bugs.689
Jobert Abma on TwitterHacker tip: when youā€™re looking for IDORs in a model that references another model, try storing IDs that donā€™t exists yet. Iā€™ve seen a number of times now that, because the model canā€™t be found, the system will save the ID. (1/2) #TogetherWeHitHarder42
A Less Known Attack Vector, Second Order IDOR AttacksMost of you probably familiar within the vulnerability types ā€œIDOR (Insecure Object Direct Reference)ā€ and second order vulnerabilities such as ā€œSecond Order SQL Injection.989
Accidental IDOR that Deleted Admin Account.Hey Everyone, Last week I got invited to a private program through one of my friend Ananda Dhakal. So I was testing out that program and at starting I found a normal rate limiting worth $25 šŸ˜…šŸ˜…Ā , Yeah Itā€™s too low, I was also not happy with it.325
A Less Known Attack Vector, Second Order IDOR AttacksInsecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files.841
Chains on Chains!! Chaining several IDORā€™s into Account Takeover(PART ONE)Daniel MarteNov 15, 2019Ā·4 min readHello Everybody,Welcome to my FIRST writeup! Just to give you some background, My name is Daniel, I started hacking about 4 months ago and canā€™t stop! Iā€™ve really been enjoying learning and exploiting some bugs! :D This writeup will be about how I achieved my947
How I could delete Facebook Ask for Recommendations postā€™s place objects in commentsThis blog post is about an Insecure direct object reference vulnerability in Facebook Ask for Recommendations post. using attacker could have remove place object card in comments.209
Stories Of IDOR-Part 2So Today i am going to share another IDOR story, well all stories in this blog is for single website, let name it xyz.com. Its an Education platform, mostly for the Political/Media/Historians students, where it gave a grouped platform for discussions.665
Inf0rM@tion Disclosure via IDORThree Duplicates & a Final BLOW! The ā€œuserIdā€ parameter was vulnerable to IDOR! If we change the userId than it was showing out Email addresses and Names of all the registered Users in the Activity Log of the web application.1323
GraphQL IDOR leads to information disclosureHello World!, Iā€™m Eshan Singh aka R0X4R. Iā€™m here to share my recent findings on GraphQL IDOR (Insecure Direct Object Reference), which leads to information disclosure. So, letā€™s start. Iā€™m signing inā€¦ What is GraphQL?495
cat ~/footstep.ninja/blog.txtIn my previous post, I shared my love for testing Insecure Direct Object Reference (IDOR) vulnerability. This time Iā€™ll be sharing the situation where I found an IDOR in Websockets. You may want to read this write-up before you continue. But in short, I shared how I approach testing Websockets.333
cat ~/footstep.ninja/blog.txtIn this post, Iā€™ll be talking about an interesting bug chain I discovered a few months ago; Stored XSS + IDOR (Cross Site Scripting and Insecure Direct Object Reference respectively). The target is an application that helps manage finances.293
cat ~/footstep.ninja/blog.txtOh! Yea, HTTP is the most common channel you could find an Insecure Direct Object Reference (IDOR) Vulnerability (IMO). I should call this an IDOR series, hahah! In my last post, I mentioned there was a vulnerable HTTP PUT request on the target.396
Stories Of IDORInsecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly. Now he able to view U2 file from his account.794