4.5 Authorization Testing
Is it possible to identify cookies used by the web application for the dynamic generation of pages or templates?
Assess bypassing techniques and identify the extent of path traversal.
Is it also possible to include files and scripts located on external website
If protocols are accepted as arguments, is it also possible to probe the local filesystem this way
?file=file:///etc/passwd
?
Try to perform Path Traversal on the server's URL PATH
Evidence:
Asses the vertical privileges
Register or generate two users with a higher and a lower privileges.
Establish and maintain two different sessions based on the two different roles.
For every request, change the session identifier from the original to another roleâs session identifier and evaluate the responses for each. (Usage of Autorize)
An application will be considered vulnerable if the weaker privileged session contains the same data, or indicate successful operations on higher privileged functions.
Asses the horizontal privileges.
Register or generate two users with identical privileges.
Establish and keep two different sessions active (one for each user).
For every request, change the relevant parameters and the session identifier from token one to token two and diagnose the responses for each token. (Usage of Autorize)
An application will be considered vulnerable if the responses are the same, contain same private data or indicate successful operation on other usersâ resource or data.
Testing for Special Request Header Handling
Try to test if theres is support of the headers
X-Original-URL: /donotexist1
andX-Rewrite-URL: /donotexist2
. If they are try use them in order to bypass URLs that might not be blocked for being accessed from the Internet.Try different headers and values (Burp's Cluster Bomb attack)
Attempt to switch, change, or access another role: Use tools like Multi-Account container (Firefox Add-on) and Authorize (Burp Suite)
Headers:
Values: https://nip.io/
Evidence:
Identify injection points related to privilege manipulation.
Fuzz or otherwise attempt to bypass security measures.
Evidence:
Identify points where object references may occur. Look for requests that contain parameters with values such as IDs, function names or files.
Look for ID numbers:
Assess the access control measures and if theyâre vulnerable to IDOR. Check if certain users that should not have access to those resources can access them. (Autorize)
If UUID are used check its version. Because version 1 is based on time stamps you can perform a sandwich attack.
Look for IDs:
Evidence:
Last updated