<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									A01:2021 – Broken Access Control - Cyber Security				            </title>
            <link>https://www.hacktheforum.com/cyber-security/a012021-broken-access-control/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 18 Apr 2026 21:53:45 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>A01:2021 – Broken Access Control</title>
                        <link>https://www.hacktheforum.com/cyber-security/a012021-broken-access-control/#post-19912</link>
                        <pubDate>Wed, 05 Nov 2025 01:32:08 +0000</pubDate>
                        <description><![CDATA[Broken Access Control occurs when a web application fails to properly enforce restrictions on what authenticated users can do.In other words, users can act outside of their intended permissi...]]></description>
                        <content:encoded><![CDATA[<p data-start="45" data-end="364"><strong data-start="45" data-end="70">Broken Access Control</strong> occurs when a web application fails to properly enforce restrictions on what authenticated users can do.<br data-start="175" data-end="178" />In other words, users can <strong data-start="204" data-end="249">act outside of their intended permissions</strong> — such as accessing other users’ data, modifying resources they shouldn’t, or performing administrative functions.</p>
<h3 data-start="371" data-end="415"><strong data-start="378" data-end="415">Examples of Broken Access Control</strong></h3>
<div class="_tableContainer_1rjym_1">
<div class="group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse">
<table class="w-fit min-w-(--thread-content-width)" data-start="417" data-end="1195">
<thead data-start="417" data-end="450">
<tr data-start="417" data-end="450">
<th data-start="417" data-end="431" data-col-size="sm"><strong data-start="419" data-end="430">Example</strong></th>
<th data-start="431" data-end="450" data-col-size="lg"><strong data-start="433" data-end="448">Description</strong></th>
</tr>
</thead>
<tbody data-start="485" data-end="1195">
<tr data-start="485" data-end="668">
<td data-start="485" data-end="532" data-col-size="sm"><strong data-start="487" data-end="531">Insecure Direct Object References (IDOR)</strong></td>
<td data-col-size="lg" data-start="532" data-end="668">A user accesses someone else’s data by modifying a resource identifier in a request (e.g., <code data-start="625" data-end="643">/account?id=1234</code> → <code data-start="646" data-end="664">/account?id=1235</code>).</td>
</tr>
<tr data-start="669" data-end="790">
<td data-start="669" data-end="690" data-col-size="sm"><strong data-start="671" data-end="689">Force Browsing</strong></td>
<td data-col-size="lg" data-start="690" data-end="790">Accessing restricted pages (like <code data-start="725" data-end="733">/admin</code>) by guessing URLs without proper authorization checks.</td>
</tr>
<tr data-start="791" data-end="926">
<td data-start="791" data-end="827" data-col-size="sm"><strong data-start="793" data-end="826">Vertical Privilege Escalation</strong></td>
<td data-col-size="lg" data-start="827" data-end="926">A normal user performing admin actions (e.g., deleting other users) due to missing role checks.</td>
</tr>
<tr data-start="927" data-end="1052">
<td data-start="927" data-end="965" data-col-size="sm"><strong data-start="929" data-end="964">Horizontal Privilege Escalation</strong></td>
<td data-start="965" data-end="1052" data-col-size="lg">A user accessing another user’s resources (e.g., viewing another person’s profile).</td>
</tr>
<tr data-start="1053" data-end="1195">
<td data-start="1053" data-end="1081" data-col-size="sm"><strong data-start="1055" data-end="1080">CORS Misconfiguration</strong></td>
<td data-start="1081" data-end="1195" data-col-size="lg">Improperly configured Cross-Origin Resource Sharing that allows unauthorized domains to access sensitive APIs.</td>
</tr>
</tbody>
</table>
</div>
<h3 data-start="1202" data-end="1226"><strong data-start="1209" data-end="1226">Common Causes</strong></h3>
<ul data-start="1228" data-end="1584">
<li data-start="1228" data-end="1290">
<p data-start="1230" data-end="1290">Missing or ineffective access control checks on server-side.</p>
</li>
<li data-start="1291" data-end="1398">
<p data-start="1293" data-end="1398">Relying on client-side enforcement (e.g., hiding buttons in the UI but not enforcing server-side checks).</p>
</li>
<li data-start="1399" data-end="1454">
<p data-start="1401" data-end="1454">Using predictable identifiers (IDs, filenames, URLs).</p>
</li>
<li data-start="1455" data-end="1500">
<p data-start="1457" data-end="1500">Misconfigured permissions or default roles.</p>
</li>
<li data-start="1501" data-end="1584">
<p data-start="1503" data-end="1584">Lack of centralized access control logic (scattered or inconsistent enforcement).</p>
</li>
</ul>
</div>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cyber-security/">Cyber Security</category>                        <dc:creator>Rinki Singh</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cyber-security/a012021-broken-access-control/#post-19912</guid>
                    </item>
							        </channel>
        </rss>
		