😎Access Control List
Today i will Explain what is Access Control List in simple way :
👏 what is Access control (or authorization) :
is the application of restrictions on
who can perform actions or what resource can he access
what can access control depend on ??
Authentication : identify if that is the right person or no
Session management : Determine if the same person made the HTTP request or another person
Access control : determines if this user is allowed to perform this action or not ?
😄 Types of ACL :
Vertical access controls
: If a user can gain access to functionality that they are not permitted to access or notFor example, if a regular user can gain access to an admin page where they can delete user accounts, then this is vertical privilege escalation.
EX: we have 3 different types of users have access to different application functions of any system ,, user - moderator (accept posts ,,, ) - admin Problem here is : ⇒
problem here : If a
user can gain access to functionality that they are not permitted to access
then this is vertical privilege escalation. For example, if anon-administrative user can in fact gain access to an admin page
where theycan delete user accounts
any user can do the role of another user , such as
user do admin things
-moderator add/delete users
🤟 Example of this Vulnerability :
unprotected Functionality : regular user can access admin function with access sensitive functionality like access admin-panel
can be in an unpredictable location, but the location is disclosed somewhere in the application.
Parameter-based access control methods :
?admin=true ?role=1
🔥Impact :
always we can get Privilege Escalation
From Vertical access
Horizontal access controls
: it happen between 2 users in the same privilege :
if a user is able to gain access to resources belonging to another user with the same privilege
different users have access to a resources of the same type. such as : setting in application
For example 1 , a banking application
will allow a user to view transactions and make payments from their own accounts
Vuln EX :
when user
X
canview transactions and make payments
of userY
or any other user.in facebook :
change the setting site from X to another user and make change in sensitive data
EX : https://target.com/myaccount?id=123
If an attacker modifies the
id
parameter value to that of another user, they might gain access to another user's account page😁 Impact :
Lead to Brocken Access Control
Context-dependent access controls : it happen depend on the kind of application and change from application to another
🔥 Horizontal to vertical privilege escalation :
horizontal privilege escalation attack can be turned into a vertical privilege escalation by compromising a more privileged user
EX : horizontal escalation might allow an attacker to
reset or capture the password belonging to another user.
If the attacker targets an administrative user and compromises their account,
then they can gain administrative access and so perform vertical privilege escalation.
https://target.com/myaccount?id=456
lets change ?id=1 may be admin account 😊😊
Last updated