CWE-425

Direct Request ('Forced Browsing')

Weakness Description

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.

Potential Mitigations

Architecture and DesignOperation

Apply appropriate access control authorizations for each access to all restricted URLs, scripts or files.

Architecture and Design

Consider using MVC based frameworks such as Struts.

Common Consequences

ConfidentialityIntegrityAvailabilityAccess Control
Read Application DataModify Application DataExecute Unauthorized Code or CommandsGain Privileges or Assume Identity
Advertisement