Risk: | high |
Damage: |
high |
Platform(s): |
Linux OS Microsoft® Server OS |
Advisory ID: |
ngCERT-2023-0032 |
Version: |
N/A |
CVE: |
CVE-2022-0732 |
Published: |
August 1, 2023 |
CISA and its partners recently released an advisory to warn vendors, designers, developers, and end-users of web applications about IDOR vulnerabilities, which are access control vulnerabilities that enable threat actors to modify or delete data. In addition, these vulnerabilities enable threat actors to access sensitive data by issuing requests to a web application programming interface (API) specifying the user identifier of valid users. These vulnerabilities are frequently exploited by malicious actors in data breach incidents because they are common, hard to prevent outside the development process, and can be abused at scale. IDOR vulnerabilities have resulted in the compromise of personal, financial, and health information of millions of users and consumers
Threat actors actively abuse IDOR vulnerabilities using automation tools to gain access to the sensitive information of millions of consumers. IDOR vulnerabilities are exploited by issuing requests to a website or web API specifying the user identifier of other, valid users. These attacks are usually made possible due to insufficient authentication and authorization checks. For example, an application or API may require an identifier such as an ID number, name, or key to directly access an object such as a database record; however, an attacker may have a valid ID number, name, or key.
The IDOR vulnerabilities can give rise to the possibility of any or all of the following:
Vendors, designers, developers, and implementors of web applications are advised to do the following to reduce the prevalence of IDOR vulnerabilities.