IDOR to view order information of users and personal information
Medium
A
Affirm
Submitted None
Actions:
Reported by
xfiltrer
Vulnerability Details
Technical details and impact analysis
## Summary:
[Broken access control is the method of controlling which users can perform a certain type of action or view set of data. Broken access control is a vulnerability that allows an attacker to circumvent those controls and perform more actions than they are allowed to, or view content they typically don’t have access to. Such vulnerability, when exploited, could lead to massive loss of data.]
## Steps To Reproduce:
Navigate to https://razer.com and purchase something
Now select the option to use “Affirm” as a financing option
Look for the POST parameter of /api/██████/ and the request will inform you of the “checkout_ari”:“XXXXXXXXXXXXXXXX” generated for that specific purchase.
Forward this Request to the repeater, then change the value “checkout_ari”:“XXXXXXXXXXXXXXXX” to “checkout_ari”:“YYYYYYYYYYYYYYYYY” and the back-end will return the requested order with all the user’s purchase information from his full address, means payments, and products.
Please check the attachments for POCs
## Supporting Material/References:
image.png1(██████████)
image2(██████████)
image3(██████)
image4(████)
video(███)
Remediation Recommendations
Implement proper access control measures around data sets and functions. Ensure that only authorized users are able to view data or perform the functions they are intended. Implement object-based access controls. This will ensure that users who circumvent UI restrictions are still restricted from retrieving any sensitive data or perform restricted actions without proper authorization. Please review the OWASP foundations recommendations for more specific details on Broken Access Control.
References
https://www.owasp.org/index.php/Category:Access_Control
https://www.owasp.org/index.php/Access_Control_In_Your_J2EE_Application
https://www.owasp.org/index.php/Broken_Access_Control
## Impact
Once a flaw is discovered, the consequences of a flawed access control scheme can be devastating. In addition to viewing unauthorized content, an attacker might be able to change or delete content, perform unauthorized functions, or even take over site administration.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$500.00
Submitted
Weakness
Insecure Direct Object Reference (IDOR)