Insecure Direct Object Reference

Insecure Direct Object Reference

A | B | C | D | E | G | I | K | L | M | N | O | P | R | S | T | W | Z

A | B | C | D | E | G | I | K | L | M | N | O | P | R | S | T | W | Z

IDOR vulnerabilities are access control authorization issues made possible when an application exposes a reference to an internal implementation object. This allows attackers to launch an enumeration attack to access data associated to such objects. It is also called Broken Object Level Authorization (BOLA).