Module 15: Insecure Direct Object Referencing
Introduction to IDOR
Static File IDOR

Database Object Referencing (ID-Based) IDOR
Exploiting IDOR in the Sandbox
Accessing the IDOR Sandbox Application
Exploiting Static File IDOR




Exploiting ID-Based IDOR




Exploiting More Complex IDOR




Extra Miles
Case Study: OpenEMR
Accessing The OpenEMR Case Study
Discovery of the IDOR Vulnerability










Exploiting the IDOR Vulnerability


Extra Mile
PreviousModule 14: Server-side Request ForgeryNextModule 16: Assembling the Pieces: Web Application Assessment Breakdown
Last updated