Simple Python script for exploiting IDOR-BOLA
Jul 11, 2023
python3 -c 'for i in range(1,2001): print(i)' > num.txt
```
python3 -c ‘for i in range(1,2001): print(i)’ > num.txt
```
Use case: This can be used for automated fuzzing of webpages for IDOR/BOLA.
The generated numbers(or id’s) can be used with FFUF to fuzz webpages.
results may be improved by adding the switch ```-fs``` (filter size)
— — — — — — — — — — — -
**Insecure direct object references** (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly.
**Broken object-level authorization** (BOLA) vulnerabilities occur when a user is able to access other users’ data due to the flaws in authorization controls validating access to data objects