Broken Access Control

intermediate
access-control authorization privilege-escalation

Authentication –> Identifies users and confirms the identity Session Management –> Once Authenticated , will be needed to access the other page as well, to make sure with the same user auth we use session. (Set-Cookie) Access Control –> Checks with the Session and verifies the User Authenticity to perform the action

Access Control Types:

  • Vertical Access control -Accessing admin resources from user access control
  • Horizontal Access control -Accessing Other users resources from the same role
  • Context-Dependent Access control -Skipping the Step directly to the end process(Avoiding the Confirmation and Deletion the content) or (Directly accessing the success page of payment without the paying the amount)

Broken Access Control:

  • Horizontal Privilage Escalation
  • Vertical Privilage Escalation
  • Access control Vulnerability in Multi-step processes (Context-Dependent Access control)

Other Access Control:

  • Bypass access by changing the parameter in the URL or HTML page
  • Accesing the API with the missing Access control
  • Tampering JWT web Token or Cookies
  • CORS misconfiguration
  • Force browsing

Impact of Access control Vulnerability:

CIA traid issue:
Confidentiality      : Access to other user's data 
Integrity            : Access to update other user's data
Availability         : Access to Delete user

Reference:

https://youtu.be/_jz5qFWhLcg?si=drwMlLNzqMaHhHUj