RonSwanson
Expert Member
- Joined
- May 21, 2018
- Messages
- 4,402
Rookie mistake.
From Wired:
From Wired:
Parler's cardinal security sin is known as an insecure direct object reference, says Kenneth White, codirector of the Open Crypto Audit Project, who looked at the code of the download tool @donk_enby posted online. An IDOR occurs when a hacker can simply guess the pattern an application uses to refer to its stored data. In this case, the posts on Parler were simply listed in chronological order: Increase a value in a Parler post url by one, and you'd get the next post that appeared on the site. Parler also doesn't require authentication to view public posts and doesn't use any sort of "rate limiting" that would cut off anyone accessing too many posts too quickly. Together with the IDOR issue, that meant that any hacker could write a simple script to reach out to Parler's web server and enumerate and download every message, photo, and video in the order they were posted.
Insecure Direct Object Reference Prevention - OWASP Cheat Sheet Series
Website with the collection of all the cheat sheets of the project.cheatsheetseries.owasp.org