Skip to content

Commit e819678

Browse files
committed
Add a guideline about managing access to objects (IDOR)
1 parent 419a004 commit e819678

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

docs/security_guidelines.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,21 @@ To mitigate this:
157157
- [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html) (OWASP)
158158
- [SSRF](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF) (MDN)
159159

160+
### Verify access to objects
161+
162+
Insufficient access control and insecure exposure of object identifiers, such as database keys or file paths can lead to [Insecure Direct Object Reference (IDOR)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/IDOR) attacks.
163+
164+
To mitigate this:
165+
166+
- Always verify that the authenticated user is authorized to access or modify the object.
167+
- Avoid exposing predictable, sequential, or sensitive object identifiers (like user IDs or email addresses).
168+
- Use more complex IDs that are harder to predict (for example, UUIDs).
169+
170+
#### Learn more
171+
172+
- [Insecure Direct Object Reference Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet.html) (OWASP)
173+
- [Insecure Direct Object Reference (IDOR)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/IDOR) (MDN)
174+
160175
## Security practices
161176

162177
This category lists practices you can follow, which help reduce the risk of introducing security vulnerabilities into your web application, or help you respond to vulnerabilities.

0 commit comments

Comments
 (0)