AttackVector.tech

What is Broken Access Control?

Discover what Broken Access Control is, a top OWASP vulnerability allowing unauthorized access. Learn its types, risks, and prevention methods.

Explain Like I'm 5

Think of your digital world like a house with different rooms, each meant for specific people. You wouldn't want just anyone to walk into your private bedroom or office, right? Now, imagine if the keys to these rooms were mixed up or some doors didn't lock at all. That's what broken access control is like online. It's when the security measures meant to keep parts of a website or app private aren't working properly. This means people can accidentally or intentionally enter areas they shouldn't, just like a stranger wandering into your private space. If someone sneaks into the wrong digital room, they might see or take things they shouldn't, like your personal information or important files.

Technical Definition

Definition

Broken access control refers to vulnerabilities that allow unauthorized users to access restricted resources or perform actions that should be beyond their permissions. It ranks as the top issue in the OWASP Top 10 list of web application security risks as of 2021.

How It Works

  1. 1Vertical Privilege Escalation: An attacker gains higher-level permissions than they should, such as a regular user accessing admin functions.
  2. 2Horizontal Privilege Escalation: An attacker accesses resources of another user with the same privilege level, like user A accessing user B's data.
  3. 3Path Traversal: Using '../' sequences to access files and directories outside of the intended directory.
  4. 4Missing Function-Level Access Control: Functions and APIs are not adequately protected, allowing unauthorized use.
  5. 5IDOR (Insecure Direct Object Reference): Accessing data by manipulating a reference, such as changing a URL parameter to view another user's information.

Key Characteristics

  • Inadequate Authorization: Resources are insufficiently protected.
  • IDOR Vulnerabilities: Direct access to objects through predictable references.
  • Misconfigured Access Controls: Reliance on client-side controls rather than server-side.

Comparison

ConceptDescription
Broken Access ControlUnauthorized access to resources or actions
IDORA type of Broken Access Control involving direct object references
Path TraversalAccessing unauthorized files through directory path manipulation

Real-World Example

In the 2021 Parler data breach, sequential IDs allowed users to access others' data, exposing sensitive information. This breach highlighted the dangers of predictable references—a classic case of IDOR.

Detection & Prevention

  • Tools: Use Burp Suite and OWASP ZAP to identify access control weaknesses.
  • Secure Coding: Implement server-side checks for authorization.
  • Access Control Models: Use role-based access control (RBAC) to define permissions.

Common Misconceptions

  • Client-Side Security: Believing client-side checks are sufficient for access control.
  • Single Authentication Equals Authorization: Assuming that once authenticated, all actions are authorized.
  • Complexity Equals Security: Thinking complex systems inherently provide better access control.

Keywords

what is Broken Access ControlBroken Access Control explainedBroken Access Control detectionOWASP Top 10 Broken Access ControlIDORaccess control vulnerabilities

Ready to scan your site?

AttackVector uses AI agents to find vulnerabilities before attackers do. Start a free scan now.

Start Free Scan