• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Whenever you search in PBworks, Dokkio Sidebar (from the makers of PBworks) will run the same search in your Drive, Dropbox, OneDrive, Gmail, and Slack. Now you can find what you're looking for wherever it lives. Try Dokkio Sidebar for free.


Insufficient Authorization

Page history last edited by Robert Auger 12 years, 11 months ago

Project: WASC Threat Classification

Threat Type: Weakness

Reference ID: WASC-02


Insufficient Authorization

Insufficient Authorization results when an application does not perform adequate authorization checks to ensure that the user is performing a function or accessing data in a manner consistent with the security policy. Authorization procedures should enforce what a user, service or application is permitted to do. When a user is authenticated to a web site, it does not necessarily mean that the user should have full access to all content and functionality.


Insufficient Function Authorization

Many applications grant different application functionality to different users. A news site will allows users to view news stories, but not publish them. An accounting system will have different permissions for an Accounts Payable clerk and an Accounts Receivable clerk. Insufficient Function Authorization happens when an application does not prevent users from accessing application functionality in violation of security policy.

A very visible example was the 2005 hack of the Harvard Business School's application process. An authorization failure allowed users to view their own data when they should not have been allowed to access that part of the web site.


Insufficient Data Authorization

Many applications expose underlying data identifiers in a URL. For example, when accessing a medical record on a system one might have a URL such as:


If the application does not check that the authenticated user ID has read rights, then it could display data to the user that the user should not see.

Insufficient Data Authorization is more common than Insufficient Function Authorization because programmers generally have complete knowledge of application functionality, but do not always have a complete mapping of all data that the application will access. Programmers often have tight control over function authorization mechanisms, but rely on other systems such as databases to perform data authorization.



"HBS To Reject Snooping Hopefuls." Harvard Crimson

[1] http://www.thecrimson.com/article.aspx?ref=506247


"Data lapse involved 51,000 at a hospital"

[2] http://www.webappsec.org/projects/whid/list_id_2007-35.shtml


"iDefense: Brute-Force Exploitation of Web Application Session ID's", By David Endler - iDEFENSE Labs.

[3] http://www.cgisecurity.com/lib/SessionIDs.pdf

Comments (0)

You don't have permission to comment on this page.