Skip to content

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

License

Notifications You must be signed in to change notification settings

qeeqbox/authorization-bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

A threat actor may perform unauthorized functions by bypassing or abusing the target authorization mechanism

Example #1

  1. Developer forgets to remove an in-house debugging mechanism associated with user-agent
  2. A threat actor finds out changing the user-agent header to debug grants different or higher privileges

Impact

Vary

Risk

  • read & modify data
  • execute commands

Redemption

  • validate access control

ID

91f9b046-b802-425a-b71b-64c21c6b1c0f

References

About

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks

Sponsor this project