Skip to content

Latest commit

 

History

History
23 lines (16 loc) · 672 Bytes

README.md

File metadata and controls

23 lines (16 loc) · 672 Bytes

A threat actor may perform unauthorized functions by bypassing or abusing the target authorization mechanism

Example #1

  1. Developer forgets to remove an in-house debugging mechanism associated with user-agent
  2. A threat actor finds out changing the user-agent header to debug grants different or higher privileges

Impact

Vary

Risk

  • read & modify data
  • execute commands

Redemption

  • validate access control

ID

91f9b046-b802-425a-b71b-64c21c6b1c0f

References