T 5.172 Bypassing the authorisation in web applications

If a user has properly logged in to a web application, the user must not necessarily be granted access to all functions of the web application (depending on the role he/she was assigned). Therefore, the web application must verify for individual functions whether the logged in user is authorised for execution (authorisation) upon successful authentication of the user.

Within the framework of attacks against the authorisation component of a web application, the aim is to access functions or data actually only available to a limited group of users. If the access authorisation is implemented improperly by the web application, an attacker may expand his/her authorisations and gain access to protected areas and data of the web application. This is normally performed by targeted manipulated input of the attacker.

For example, possible aims of an attack include configuration files with fixedly coded access data for background systems, protected areas, or functions of the web application.

Below, possible weaknesses regarding the authorisation of accesses to web resources are listed.

Examples: