Unprotected Functionality:
At its most basic, vertical privilege escalation arises where an application does not enforce any protection for sensitive functionality.
For example, administrative functions might be linked from an administrator's welcome page but not from a user's welcome page. However, a user might be able to access the administrative functions by browsing to the relevant admin URL.
Parameter-based access control methods
Some applications determine the user's access rights or role at login, and then store this information in a user-controllable location. This could be:
A preset query string parameter.
Broken access control resulting from platform misconfiguration
Some applications enforce access controls at the platform layer. they do this by restricting access to specific URLs and HTTP methods based on the user's role.
Some application frameworks support various non-standard HTTP headers that can be used to override the URL in the original request, such as X-Original-URL and X-Rewrite-URL.
Some websites tolerate different HTTP request methods when performing an action. If an attacker can use the GET (or another) method to perform actions on a restricted URL.
Broken access control resulting from URL-matching discrepancies
Websites can vary in how strictly they match the path of an incoming request to a defined endpoint. For example, they may tolerate inconsistent capitalization, so a request to /ADMIN/DELETEUSER
may still be mapped to the /admin/deleteUser
endpoint.
Similar discrepancies can arise if developers using the Spring framework have enabled the useSuffixPatternMatch
option. This allows paths with an arbitrary file extension to be mapped to an equivalent endpoint with no file extension. In other words, a request to /admin/deleteUser.anything
would still match the /admin/deleteUser pattern
.
On other systems, you may encounter discrepancies in whether /admin/deleteUser
and /admin/deleteUser/
are treated as distinct endpoints.
Access control vulnerabilities in multi-step processes
Many websites implement important functions over a series of steps.
Sometimes, a website will implement rigorous access controls over some of these steps, but ignore others.
Example:
Imagine a website where access controls are correctly applied to the first and second steps, but not to the third step.
An attacker can gain unauthorized access to the function by skipping the first two steps and directly submitting the request for the third step with the required parameters.
Referer-based access control
Some websites base access controls on the Referer header submitted in the HTTP request.
The Referer header can be added to requests by browsers to indicate which page initiated a request.
Location-based access control
Some websites enforce access controls based on the user's geographical location.
These access controls can often be circumvented by the use of web proxies, VPNs, or manipulation of client-side geolocation mechanisms.