Configuring broken access control testing using REST APIs
Broken access control occurs when an application doesn't properly enforce restrictions on what authenticated users are allowed to do. Attackers can exploit these vulnerabilities to gain unauthorized access to sensitive data or functionality.
Before you begin
Before you configure broken access control testing, make sure you meet the
following requirements:
- An existing DASTConfig job that's not in a "Running" or "Completed" state.
- Baseline traffic files for the roles you want to test. Supported file
formats:
.har,.seqe,.exd, and.dast.config(covering both FIPS and non-FIPS encrypted files generated by Activity Recorder and Traffic Recorder). - A target URL that exactly matches the baseline traffic file URL.
- A file size that doesn't exceed 200 MB per role.
Note:
Standard
.scan files aren't supported for this feature.About this task
This testing identifies two main scenarios:
- Vertical access control: A lower-privileged user accesses functions or data reserved for a higher-privileged user (for example, a standard user accessing an administrative dashboard).
- Horizontal access control: A user accesses data belonging to another user with the same privilege level (for example, User A viewing User B's private account details).
To prevent false positives on public pages (pages accessible without authentication), AppScan Enterprise uses a delta mechanism. It compares the authenticated user's traffic against a non-authenticated user baseline. If a page is accessible to the non-authenticated user, it acts as an exclusion list and isn't flagged as a broken access control vulnerability.