Question: 141
In the context of disaster recovery within a data center, ho...
An online automotive service platform allows users to download their vehicle maintenance records by accessing URLs with a file query parameter, such as https://autoservice.com/download?file=maintenance_1234.pdf. During a penetration test, it was discovered that by changing the file parameter to maintenance_1235.pdf, an attacker could download another user's maintenance records without any authentication or authorization checks. The filenames follow a predictable pattern and are stored in a publicly accessible directory. Which of the following actions would most effectively mitigate this Insecure Direct Object Reference (IDOR) vulnerability?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!