Skip to content

Latest commit

 

History

History
27 lines (19 loc) · 709 Bytes

README.md

File metadata and controls

27 lines (19 loc) · 709 Bytes

A threat actor may perform unauthorized functions belonging to another user with a similar privileges level.

Example #1

  1. Threat actor alters a value that indicates users' group
  2. Target authorizes adversary to perform functions as if they were part of that group

Names

  • Horizontal access control attack

Impact

Vary

Risk

  • Read & modify data
  • Execute commands

Redemption

  • Validate access control
  • Least privileges

ID

cb8496ab-c8f4-4fda-99a3-37e0b8bc2d55

References