当前位置:网站首页>Horizontal ultra vires and vertical ultra vires [easy to understand]
Horizontal ultra vires and vertical ultra vires [easy to understand]
2022-07-02 19:22:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm your friend, Quan Jun .
lateral ultra vires : Horizontal ultra vires refers to the attacker's attempt to access the resources of the user with the same permissions Vertical ultra vires : Vertical override refers to a low-level attacker trying to access the resources of a high-level user
How to prevent horizontal ultra vires loopholes :
- By establishing the binding relationship between users and operable resources , When users operate on any resource , Ensure that the resource is owned by the user through the binding relationship .
- Indirect mapping of key parameters in the request , Avoid using the original key parameter name , For example, using index 1 Instead of id value 123 etc.
How to prevent vertical ultra vires loopholes :
It is recommended to use role-based access control mechanism to prevent vertical over authority attacks , That is, define different permission roles in advance , Assign different permissions to each role , Each user belongs to a specific role , I.e. I have a fixed authority , When a user performs an action or produces an action , Determine whether the action or action is allowed by the user's role .
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/148590.html Link to the original text :https://javaforall.cn
边栏推荐
- [test development] takes you to know what software testing is
- Digital scroll strip animation
- 全志A33使用主线U-Boot
- Excel finds the same value in a column, deletes the row or replaces it with a blank value
- Binary operation
- When converting from list to map, if a certain attribute may cause key duplication and exceptions, you can set the way to deal with this duplication
- How can retail enterprises open the second growth curve under the full link digital transformation
- End-to-End Object Detection with Transformers(DETR)论文阅读与理解
- Gstore weekly gstore source code analysis (4): black and white list configuration analysis of security mechanism
- 使用 Cheat Engine 修改 Kingdom Rush 中的金钱、生命、星
猜你喜欢

codeforces每日5题(均1700)-第四天

Advanced performance test series "24. Execute SQL script through JDBC"

Stm32g0 USB DFU upgrade verification error -2

数据降维——主成分分析

新手必看,點擊兩個按鈕切換至不同的內容

【JVM调优实战100例】01——JVM的介绍与程序计数器

High frequency interview questions

Imitation Jingdong magnifying glass effect (pink teacher version)

Have you stepped on the nine common pits in the e-commerce system?

中国信通院《数据安全产品与服务图谱》,美创科技实现四大板块全覆盖
随机推荐
Have you stepped on the nine common pits in the e-commerce system?
[test development] takes you to know what software testing is
Introduction to the paper | analysis and criticism of using the pre training language model as a knowledge base
聊聊电商系统中红包活动设计
Machine learning notes - time series prediction research: monthly sales of French champagne
Preprocessing and preprocessing macros
Binary operation
C文件输入操作
潇洒郎:彻底解决Markdown图片问题——无需上传图片——无需网络——转发给他人图片无缺失
守望先锋世界观架构 ——(一款好的游戏是怎么来的)
云呐|为什么要用固定资产管理系统,怎么启用固定资产管理系统
[100 cases of JVM tuning practice] 01 - introduction of JVM and program counter
Tutorial (5.0) 10 Troubleshooting * fortiedr * Fortinet network security expert NSE 5
《病人家属,请来一下》读书笔记
PHP asymmetric encryption method private key and public key encryption and decryption method
【pytorch学习笔记】Tensor
Web2.0的巨头纷纷布局VC,Tiger DAO VC或成抵达Web3捷径
Mysql高级篇学习总结8:InnoDB数据存储结构页的概述、页的内部结构、行格式
教程篇(5.0) 09. RESTful API * FortiEDR * Fortinet 网络安全专家 NSE 5
metric_logger小解