Insecure Direct Object Reference (IDOR)

IDOR vulnerabilities occur when a web application exposes a direct reference to an object, like a file or a database resource, which the end-user can directly control to obtain access to other similar objects. If any user can access any resource due to the lack of a solid access control system, the system is considered to be vulnerable.

IDOR

The main takeaway is that an IDOR vulnerability mainly exists due to the lack of an access control on the back-end.

Last updated

Was this helpful?