Skip to content

Commit 16c9a26

Browse files
committed
FR lp4
1 parent ab83066 commit 16c9a26

File tree

6 files changed

+468
-446
lines changed

6 files changed

+468
-446
lines changed

content/learning-path/4/module-3.fr.md

Lines changed: 223 additions & 235 deletions
Large diffs are not rendered by default.

content/learning-path/4/module-4.en.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ An example of horizontal privilege escalation might be in the above online forum
6060

6161
With horizontal privilege escalation, there are three major development patterns that lead to the vulnerability. The first is that pages check that users are logged in and that they have the right access level, but completely fail to check data-level permissions. Typically this will result in the entire site, or an entire section of the site, being vulnerable. The second is that individual pages or actions fail to check data-level permissions due to developer oversight. Finally, occasionally websites will pass the user id in a URL parameter or hidden form field, instead of reading it from the server side session. The end-user can easily modify these parameters, usually resulting in privilege escalation.
6262

63-
Preventing Authorization Vulnerabilities
63+
### Preventing Authorization Vulnerabilities
6464

6565
As noted above, the two root causes for authorization vulnerabilities tend to be lack of developer awareness (hence entire sites or site sections missing the proper controls) or lack of consistency in implementing controls. Since framework support is generally poor, developers often need to implement their own controls from scratch. Here are a few tips to consider:
6666

0 commit comments

Comments
 (0)