Broken Access Control is a security vulnerability where users can access resources or perform actions outside of their intended permissions. This occurs due to improper enforcement of access restrictions, such as missing checks on user roles or insecure direct object references (IDOR). Attackers can exploit this to view, modify, or delete unauthorized data. Preventing broken access control involves implementing strict role-based access, validating user permissions, and conducting regular security testing.
You are a penetration tester hired by craw.in, a new online social media platform. You've been given a basic user account and are tasked with identifying potential Broken Access Control vulnerabilities. Craw.in is hosted at http://craw.in.