Protect Your Web Apps From Insecure Direct Object References

Web apps that point to specific files, database records or directories risk attack. Learn how object references can compromise your network security and what you can do to prevent them.

By Paul Rubens | Posted Mar 7, 2011
Page 1 of 2
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Imagine a malicious hacker could access all your organization's customer account details, or charge an online purchase to someone else's credit card, just by changing a couple of digits in a URL. It sounds unlikely, but it's precisely the kind of thing that a hacker can do if your Web applications are susceptible to an insecure direct object reference.

What is an insecure direct object reference?

The "objects" in question are internal implementation objects such as files, directories, database records or database keys, and a problem occurs when an application exposes a reference to one of these objects in a URL (or form parameter.) It's a problem because a hacker can change these direct object references, for example by altering a URL before it is submitted, to attempt to access a different, unauthorized file, directory or database entry. This attempt may be successful unless some other authorization check is enforced.

Insecure direct object reference examples

Imagine a Web app that ends up generating the URL:

http://www.insecurewebapp.com/getfile.cfm?filename=sometextfile.txt

Here there is a very obvious direct reference to a file called "sometextfile.txt", and the temptation for a hacker would be to see what happens when this filename is changed to some other filename, like "passwords.txt" or "accounts.txt".

To succeed like this the hacker would have to correctly guess the name of another file on the system, but a more methodical approach would be to look for something specific elsewhere on the system, using a path traversal attack. Essentially this means accessing a completely different directory to the anything the developer of the vulnerable application intended. To access Apache Tomcat usernames and passwords, the hacker might alter the last part of the URL to "filename=../../tomcat/conf/tomcat-users.xml

Not all insecure direct object references provide access to files, or course. Another type of URL that would be a red rag to a hacker would be one that ended with:

...account.cfm?customerid=4566

which leads our hacker to next ask, "what happens if I modify this by changing the customerid to something like 4567?"

Similarly, what happens if a Web application allows a user to select a credit card from one or more stored in a database for that user, referenced by database key:

<select name="choosecreditcard">
    <option value="35">
         XXXXXXXXXXXX6002 
    </option>
    <option value="67">
         XXXXXXXXXXXX1516 
    </option>
</select>

and the hacker modifies the database key?

Here a user would be asked to select from one of two credit cards, ending 6002 and 1516, that the application has on file for them, referenced by their database key. In the resulting URL, a hacker would only have to change the 35 or 67 option value to another number, like 36, to reference some other credit card number, belonging to another user, stored with that database key. Unless, as mentioned at the start of this article, there are other authorization checks in force to prevent this, the attack could be successful.

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter