The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
CVE: CVE-2022-29238
Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.
CVE: CVE-2022-23607
Python-based HTTP library did not scope cookies to a particular domain such that "supercookies" could be sent to any domain on redirect.
CVE: CVE-2004-2144
Bypass authentication via direct request.
CVE: CVE-2005-1892
Infinite loop or infoleak triggered by direct requests.
CVE: CVE-2004-2257
Bypass auth/auth via direct request.
CVE: CVE-2005-1688
Direct request leads to infoleak by error.
CVE: CVE-2005-1697
Direct request leads to infoleak by error.
CVE: CVE-2005-1698
Direct request leads to infoleak by error.
CVE: CVE-2005-1685
Authentication bypass via direct request.
CVE: CVE-2005-1827
Authentication bypass via direct request.
CVE: CVE-2005-1654
Authorization bypass using direct request.
CVE: CVE-2005-1668
Access privileged functionality using direct request.
CVE: CVE-2002-1798
Upload arbitrary files via direct request.
Phase | Note |
---|---|
Implementation | N/A |
Operation | N/A |
Intro: If forced browsing is possible, an attacker may be able to directly access a sensitive page by entering a URL similar to the following.
http://somesite.com/someapplication/admin.jsp