AbbySec

My digital playground – where hacking meets learning.

View on GitHub
28 February 2022

SOC169 – Possible IDOR Attack Detected

by

🧠 Summary

This investigation began as a SOC169 – Possible IDOR Attack Detected alert.

The alert was triggered due to consecutive POST requests made to a sensitive endpoint: /get_user_info/.

Log analysis revealed sequential manipulation of the user_id parameter, with successful HTTP 200 responses returned for each request.

The activity originated from a DigitalOcean VPS and is consistent with IDOR (Insecure Direct Object Reference) enumeration behavior.

The activity was confirmed as a True Positive – Web Application Enumeration Attempt.


🚨 Alert Overview


πŸ”Ž Log Analysis

Raw log review shows multiple POST requests to:

https://172.16.17.15/get_user_info/

With sequential user_id values:

POST Parameter HTTP Status Response Size
user_id=1 200 188
user_id=2 200 253
user_id=3 200 351
user_id=4 200 158
user_id=5 200 267

πŸ” Key Findings

The varying response sizes strongly suggest different user data was returned for each ID.

This behavior is consistent with object enumeration.


🌍 Source IP Investigation

VirusTotal analysis showed no security vendor detections.

However, cloud-hosted VPS infrastructure is commonly used for automated probing and enumeration attacks.

The IP classification does not indicate a residential or corporate user.


πŸ–₯ Endpoint & Host Review

The affected host (WebServer1005) was reviewed for compromise indicators:

No evidence of host-level compromise was identified.

The activity appears limited to the web application layer.


🧠 What is IDOR?

Insecure Direct Object Reference (IDOR) occurs when:

Example: POST /get_user_info/ user_id=2

If authorization checks are missing, an attacker can enumerate:

user_id=3 user_id=4 user_id=5

And retrieve other users’ information.


🎯 MITRE ATT&CK Mapping


πŸ“Š Risk Assessment

Category Assessment
External Source Yes
Enumeration Behavior Confirmed
Successful Access Likely
Data Exposure Risk High
Host Compromise Not Observed
Alert Classification True Positive

πŸ›‘ Conclusion

The alert represents a web application–level IDOR enumeration attempt.

Sequential manipulation of the user_id parameter combined with successful HTTP 200 responses indicates potential unauthorized access to user records.

Although no host compromise was observed, the behavior demonstrates a likely authorization control weakness in the /get_user_info/ endpoint.

The activity is classified as:

True Positive – IDOR Enumeration Attempt


πŸ” Recommendations


tags: