logo

Database

Description

It is possible to modify fields that are invisible to the regular user and cause undesired behaviors in the application.

Impact

Force unwanted actions in the application modifying resources which can not be accessible by user.

Recommendation

Send only fields that require users inputs in the requests, and control the rest from the server.

Threat

Authenticated attacker from the Internet.

Expected Remediation Time

⏱️ 60 minutes.