Skip to content

Insecure Direct Object Reference (IDOR)

Info

This note is still in development.

Overview


Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files.

Burpsuite


The most frequent method of detection that I've found is manually checking with Burpsuite. This is done by intercepting POST requests and parsing through the content your client is sending to the server.

Example:

  • User attempts to sign up for a website.
    Pasted image 20231221183933.png

  • User intercepts registration using Burpsuite's intercept functionality, and checks the POST request.
    Pasted image 20231221184118.png

  • User then sends this request to the Burpsuite repeater, modifies the value (e.g., Acctype=1 to Acctype=2) and submits the request to the web server. In the above example, the IDOR is successful and changes the registered account type to one with elevated privileges.

wfuzz


You can utilize wfuzz and other fuzzing tools to attempt to find potential IDOR's.

wfuzz
# -c    = output in color
# -z    = type of payload (e.g, file,<filepath>)
# --hc  = hide responses containing specified statuses
  • Static File IDOR

    # Adjust URL accordingly
    wfuzz -c -z range,1-100 --hc 404,301 "http://<ip_addr>/docs/?f=FUZZ.txt"
    

    Pasted image 20231025154534.png

  • ID-Based IDOR

    # Adjust URL accordingly
    wfuzz -c -z range,1-100 --hc 404,301 "http://192.168.174.101/customerPage/?custID=FUZZ"
    

  • User-Based IDOR
    Pasted image 20231025154918.png