ACSC and US partners sound alarm on web app abuse

By

Access control fumbles expose APIs.

Miscreants are exploiting insecure direct object references (IDORs) to abuse websites or web application APIs, a joint US-Australia advisory has warned.

ACSC and US partners sound alarm on web app abuse

The advisory was published Friday by the Australian Cyber Security Centre (ACSC) and US partners, the National Security Agency (NSA) and the Cyber and Infrastructure Security Agency (CISA).

The advisory explains the vulnerabilities have been exploited to compromise the “personal, financial and health information of millions of users and consumers”.

IDOR vulnerabilities allow attackers to issue requests “to a website or a web application programming interface (API) specifying the user identifier of other, valid users,” the advisory states.

“These requests succeed where there is a failure to perform adequate authentication and authorisation checks.”

Such vulnerabilities, the advisory warns, are “common, hard to prevent outside the development process, and can be abused at scale”.

In such bugs, an application or API uses an identifier such as user ID to access objects such as database records, without checking the authorisation of the user submitting the request.

This, the advisory said, gives rise to a variety of abuses: horizontal vulnerabilities (one user accesses the data of another user at the same privilege level); vertical vulnerabilities (the attacker escalates their privilege); object-level, meaning a user can improperly modify or delete objects; and function-level vulnerabilities, where a user improperly accesses a function or action.

The advisory nominated data breaches from 2012 (a US communications provider), 2019 (US financial sector) and 2021 (a global company), as examples.

While neither organisation has confirmed this, the Optus and Medicare data breaches of 2022 are widely attributed to weakly-protected APIs.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Eagers Automotive finds unauthorised access to parts of IT systems

Eagers Automotive finds unauthorised access to parts of IT systems

Hackers hit Victoria's court recording database

Hackers hit Victoria's court recording database

St Vincent's Health Australia warns cyber attack forensics could "take some time"

St Vincent's Health Australia warns cyber attack forensics could "take some time"

Yakult Australia confirms cyber incident

Yakult Australia confirms cyber incident

Log In

  |  Forgot your password?