Description
Remediation Techniques:
- Deny all other resources by default except public resources and maintain logs for access control failures and alert admins.
- Implement access control checks throughout the application, including minimizing cross-origin resource sharing (CORS) usage.
- Access controls can be secured by verifying that the web application uses authorization tokens and sets tight controls on them on each accessible resources by privileged users.
- Many web platforms issue authorization tokens when users log in. Every privileged request that a user makes to access any particular type of resource, will require that authorization token be present. Also in backend method level access controls can be implemented programmatic way in order to make sure that a user with a particular privileges can access a particular resource after the user logs in.