Question: 187
What are the benefits for a bank in taking a next generation...
An online automotive service platform allows users to download their vehicle maintenance records by accessing URLs with a file
query parameter, such as https://autoservice.com/download?file=maintenance_1234.pdf
. During a penetration test, it was discovered that by changing the file
parameter to maintenance_1235.pdf
, an attacker could download another user's maintenance records without any authentication or authorization checks. The filenames follow a predictable pattern and are stored in a publicly accessible directory. Which of the following actions would most effectively mitigate this Insecure Direct Object Reference (IDOR) vulnerability?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! 🙏
No comments yet. Be the first to comment!