IDOR Vulnerability Testing
Test Web Applications for IDOR Vulnerabilities
TambĂ©m disponĂvel em: zebbern
Identify insecure direct object reference vulnerabilities that allow unauthorized access to user data. Learn systematic methodologies for detecting access control bypasses through parameter manipulation and enumeration techniques.
Baixar o ZIP da skill
Upload no Claude
Vá em Configurações → Capacidades → Skills → Upload skill
Ative e comece a usar
Testar
A utilizar "IDOR Vulnerability Testing". Test example.com/api/profile?id=1001 for IDOR vulnerabilities
Resultado esperado:
Starting IDOR vulnerability assessment...
Test 1: Increment/Decrement ID
Original: GET /api/profile?id=1001 → Returns user_1001 data
Modified: GET /api/profile?id=1000 → Returns user_1000 data
VULNERABILITY CONFIRMED: Horizontal privilege escalation detected. Application returns other users' profile data without verifying ownership.
Affected Endpoints:
- /api/profile?id={id}
- /api/user/{id}
Recommended Fix: Implement server-side ownership check comparing request.user.id with requested profile id before returning data.
A utilizar "IDOR Vulnerability Testing". Configure Burp Suite Intruder to enumerate invoice IDs
Resultado esperado:
Burp Suite Intruder Configuration:
1. Send GET /api/invoice/123 to Intruder (Ctrl+I)
2. Set payload position on '123' in the URL
3. Attack Type: Sniper
4. Payloads:
- Type: Numbers
- From: 1
- To: 500
- Step: 1
5. Start Attack
Analysis Guide:
- Filter for 200 OK status codes
- Check response content for different invoice data
- Verify if any 200 responses belong to other users
- Look for 403/404 patterns to identify valid vs invalid IDs
Risk: If 200 responses return other users' invoice data, this is a critical IDOR vulnerability exposing sensitive financial information.
A utilizar "IDOR Vulnerability Testing". Generate remediation code for the discovered IDOR vulnerability
Resultado esperado:
REMEDIATION: Address Update IDOR
Current Vulnerable Code:
def update_address(request, address_id):
address = Address.objects.get(id=address_id)
address.update(request.data) # No ownership check!
Secure Implementation:
Option 1 - Ownership Validation:
```python
def update_address(request, address_id):
address = get_object_or_404(Address, id=address_id)
if address.user_id != request.user.id:
return HttpResponseForbidden('Unauthorized')
address.update(request.data)
return JsonResponse({'status': 'success'})
```
Option 2 - Indirect Reference Pattern:
```python
def update_address(request):
# Always filter by authenticated user
address = get_object_or_404(Address, user=request.user)
address.update(request.data)
return JsonResponse({'status': 'success'})
```
Recommendation: Use Option 2 (indirect references) as it prevents IDOR by design rather than relying on validation checks.
Auditoria de Segurança
Baixo RiscoStatic analysis detected 80 external command patterns flagged as Ruby/shell backtick execution. After evaluation, all findings are FALSE POSITIVES - the backticks appear exclusively in Markdown code blocks as educational examples demonstrating IDOR vulnerability testing techniques. The skill provides legitimate security testing guidance for authorized penetration testing activities. No actual executable code or command injection risks present.
Problemas de Baixo Risco (1)
Fatores de risco
⚙️ Comandos externos (80)
Pontuação de qualidade
O Que VocĂŞ Pode Construir
Penetration Testing Web Applications
Security professionals conduct authorized penetration tests to identify IDOR vulnerabilities in client applications before malicious actors discover them
Application Security Audits
Development teams validate access control implementations during security reviews or as part of secure development lifecycle processes
Bug Bounty Hunting
Independent researchers systematically test applications for IDOR flaws to earn rewards through responsible disclosure programs
Tente Estes Prompts
Test the application at example.com for IDOR vulnerabilities. I have two user accounts (user1@test.com and user2@test.com). Walk me through the process of checking if I can access user2's data while authenticated as user1.
Help me configure Burp Suite Intruder to test /api/user/{id} and /api/order/{orderId} endpoints for IDOR vulnerabilities. Set up a sniper attack with numeric payloads from 1 to 1000 and show me how to analyze the results.The GET requests to /api/admin/users/{id} return 403 Forbidden. Show me how to test for IDOR using HTTP method switching (POST, PUT, PATCH) and parameter pollution techniques to bypass access controls.I found an IDOR vulnerability in /download/receipt_{id}.pdf where I can access other users' receipts. Generate a proof-of-concept report and provide Python code examples showing proper access control implementation to fix this issue.Melhores Práticas
- Always obtain written authorization before conducting IDOR testing on production systems. Document all testing activities and findings for proper reporting.
- Create dedicated test accounts for security assessment rather than using real user data. Use clearly identifiable data (e.g., 'IDOR_TEST_USER') to verify access without exposing actual personal information.
- Combine multiple testing techniques: parameter manipulation, HTTP method switching, and automated enumeration. Some IDOR vulnerabilities only surface through specific request patterns.
Evitar
- Never test IDOR vulnerabilities on applications without explicit permission. Unauthorized access control testing is illegal and violates computer fraud laws.
- Avoid modifying or deleting data during IDOR testing. Only perform read operations to verify vulnerability existence. Data modification can cause production issues and legal liability.
- Do not assume that randomized identifiers (UUIDs/GUIDs) prevent IDOR. UUIDs can sometimes be enumerated through API responses, JavaScript files, or time-based prediction algorithms.
Perguntas Frequentes
What is an IDOR vulnerability?
Is this skill only for security professionals?
Do I need Burp Suite to use this skill?
Can this skill detect all types of IDOR vulnerabilities?
Is it legal to test applications for IDOR vulnerabilities?
What should I do if I find an IDOR vulnerability?
Detalhes do Desenvolvedor
Autor
sickn33Licença
MIT
RepositĂłrio
https://github.com/sickn33/antigravity-awesome-skills/tree/main/web-app/public/skills/idor-testingReferĂŞncia
main
Estrutura de arquivos
đź“„ SKILL.md