Reputation: 57
I recently developed an application which was the financial app and it had undergone security vulnerability testing.
One of the point identified in the testing was- Account Takeover Through Insecure Direct Object Reference- The comment provided was as below- During security assessment, it is found that insecure authorization controls in the Android application allow an attacker to make requests on behalf of different users. It allows an attacker to take over any user's account. The application completely lacks authorization controls which allow an attacker to make requests on behalf of any user.
The remedy provided was- To prevent this, ensure user's access rights are restricted to the correct privilege level and not just by the pages available to the user in the interface of the application.
Does this mean a role-based system? My app does not need multiple user roles. There is the only single role "End User" who will be using the app.
Can someone provide insight?
Upvotes: 3
Views: 158
Reputation: 88
Each system has at least two roles: admin (privileged user) and (unprivileged) user. However, in real systems there exist several roles like editor, Finance manager, HR manager, etc. So, you need to provide these users with different level of access to the resources.
Upvotes: 0
Reputation: 1545
You need to consider the following,
Upvotes: 2
Reputation: 899
Implement OAUTH session management with access token renewal.
Upvotes: 0