Detection and Prevention of Insecure Direct Object References (IDOR) in Website-Based Applications

Rio Ananda Putra, Irwan Alnarus Kautsar, H. Hindarto, S. Sumarno
{"title":"Detection and Prevention of Insecure Direct Object References (IDOR) in Website-Based Applications","authors":"Rio Ananda Putra, Irwan Alnarus Kautsar, H. Hindarto, S. Sumarno","doi":"10.21070/pels.v4i0.1435","DOIUrl":null,"url":null,"abstract":"IDOR (Insecure Direct Object References) is a security vulnerability that occurs when a web application does not validate or authorize access to direct objects, such as data or resources, in an adequate manner. In the context of web application security, objects can be files, database records, or other resources identified by a parameter or direct reference. The IDOR technique allows an attacker to manipulate parameters passed to a web application to gain unauthorized access to objects he or she should not have access to. By exploiting this vulnerability, attackers can access, modify, or delete data that should only be accessible to authorized users. One of the dangers in accessing data on websites, data retrieval techniques from object IDs are often vulnerable to Insecure Direct Object References (IDOR) attacks. Therefore, the data retrieval technique from $_SESSION can be a safer alternative to avoid the IDOR security vulnerability. Using this technique, only the account in use can be accessed and does not allow access to other technician accounts. The use of additional query parameters can also increase website security and protect the data and information contained therein. Thus, adding additional validation to the code can help prevent IDOR vulnerabilities from occurring in web applications.","PeriodicalId":143138,"journal":{"name":"Procedia of Engineering and Life Science","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Procedia of Engineering and Life Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21070/pels.v4i0.1435","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

IDOR (Insecure Direct Object References) is a security vulnerability that occurs when a web application does not validate or authorize access to direct objects, such as data or resources, in an adequate manner. In the context of web application security, objects can be files, database records, or other resources identified by a parameter or direct reference. The IDOR technique allows an attacker to manipulate parameters passed to a web application to gain unauthorized access to objects he or she should not have access to. By exploiting this vulnerability, attackers can access, modify, or delete data that should only be accessible to authorized users. One of the dangers in accessing data on websites, data retrieval techniques from object IDs are often vulnerable to Insecure Direct Object References (IDOR) attacks. Therefore, the data retrieval technique from $_SESSION can be a safer alternative to avoid the IDOR security vulnerability. Using this technique, only the account in use can be accessed and does not allow access to other technician accounts. The use of additional query parameters can also increase website security and protect the data and information contained therein. Thus, adding additional validation to the code can help prevent IDOR vulnerabilities from occurring in web applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于网站的应用程序中不安全的直接对象引用(IDOR)的检测和预防
IDOR(不安全的直接对象引用)是一种安全漏洞,当web应用程序没有以适当的方式验证或授权对直接对象(如数据或资源)的访问时,就会发生这种漏洞。在web应用程序安全上下文中,对象可以是文件、数据库记录或其他由参数或直接引用标识的资源。IDOR技术允许攻击者操纵传递给web应用程序的参数,以获得对他或她不应该访问的对象的未经授权的访问。通过利用此漏洞,攻击者可以访问、修改或删除应该只有授权用户才能访问的数据。在访问网站上的数据的危险之一,从对象id的数据检索技术往往容易受到不安全的直接对象引用(IDOR)攻击。因此,从$_SESSION中检索数据技术可能是避免IDOR安全漏洞的更安全的替代方法。使用此技术,只能访问正在使用的帐户,不允许访问其他技术人员帐户。使用额外的查询参数还可以提高网站的安全性,并保护其中包含的数据和信息。因此,向代码中添加额外的验证可以帮助防止在web应用程序中出现IDOR漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Contamination Alert: Microbial and Heavy Metal Levels in Green Vegetables Effect of Liquid Organic Fertilizer (POC) Pineapple Peel and Trichoderma Sp. on the Growth and Yield of Cayenne Pepper (Capsicum Frutescens) Variety Ori 212 Web Based Leave Management System (Case Study of PT Java Pacific) Web-Based Company Workshop Tool Control System (Case Study of Dipo Kereta Malang) Detection and Prevention of Insecure Direct Object References (IDOR) in Website-Based Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1