Insecure Direct Object Reference (IDOR)
Methodology
Identifying Object References
Look for URLs, forms, or APIs that reference internal objects directly. Common patterns:
When References Are Encoded
If object references are hashed or encoded (e.g., base64, md5, URL encoding), understand the encoding method and reverse it.
Common encoded parameters:
uid
username
file
contract
Example:
Base64-decode: MQ==
→ 1
Mass Enumeration Example
Download Exploitation Script
Exploiting Insecure APIs
Step 1: User Enumeration
Sample output:
Step 2: Escalation via Insecure Function Calls (PUT)
This allows privilege escalation by overwriting the role
field.
Combining Leaks + Writes = Complete Takeover
First, enumerate user data (UUIDs, roles, etc.).
Then, modify those values via IDOR-vulnerable PUT endpoints.
You can:
Change all users’ emails to one you control.
Inject XSS in
about
fields.Change user roles in bulk.
Last updated