Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要观点。 文章主要讲的是授权漏洞在API中的问题,特别是BOLA和BFLA。OWASP Top 10里有提到这些,说明它们很常见。作者指出,虽然开发和安全团队知道这些漏洞,但在实际应用中,授权逻辑往往因为假设不成立而失效。 接下来,文章对比了认证和授权的不同。认证是标准化的,而授权则分散在应用逻辑中,容易被攻击者利用。攻击者通常不会绕过认证,而是利用合法的访问路径进行攻击。 然后,文章提到传统安全措施在预生产阶段无法检测到这些问题,因为它们关注的是单个请求的正确性,而不是整体的行为模式。攻击者通过自动化和枚举来放大影响。 最后,作者建议安全领导者要持续监控授权情况,并关注实际运行中的行为模式。文章还提到Wallarm如何通过运行时分析来检测和阻止API攻击。 总结一下,文章的核心是授权漏洞的严重性、传统方法的不足以及需要采取的应对措施。现在我需要把这些要点浓缩到100字以内。 </think> 文章探讨了API授权漏洞(如BOLA和BFLA)的普遍性和严重性。尽管开发团队了解这些问题,但授权逻辑在实际应用中容易因假设失效而被绕过。与标准化认证不同,授权分散于业务逻辑中,易受攻击者利用合法访问路径进行滥用。传统安全措施难以检测这些漏洞,需通过实时监控和行为分析来应对API安全挑战。 2026-3-2 13:0:0 Author: lab.wallarm.com(查看原文) 阅读量:33 收藏

Broken authorization is one of the most widely known API vulnerabilities. 

It features in the OWASP Top 10, AppSec conversations, and secure coding guidelines. Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) account for hundreds of API vulnerabilities every quarter.

According to the 2026 API ThreatStats report, authorization issues ranked ninth in the API Top 10, “reflecting chronic difficulty in managing roles and permissions at scale.”

Obviously, security and development teams know what broken authorization is. But too few recognize that authorization logic only holds up under the assumptions made before production. When APIs are exposed to real users, data, integrations, and automation, those assumptions no longer hold water. 

Relatively speaking, authentication is clean. Authorization isn’t. AuthN is centralized, standardized, and auditable. OAuth scopes, token lifetimes, and MFA policies are all mature, well-instrumented controls. You can test them deterministically and point to dashboards that prove they work. 

Authorization, on the other hand, lives inside application logic. 

It’s scattered across endpoints, methods, parameters, and workflows. BFLA, for example, often emerges because higher-privilege functionality is exposed through predictable paths or forgotten HTTP methods, not because developers forgot authentication entirely. 

The problem is that organizations start to equate strong authentication with secure APIs. But authentication only answers who you are. Authorization governs what you can do, to which objects, under what conditions – and that logic is far more fragile

Authorization Logic Is Where Risk Creeps In 

Authorization logic is inseparable from business logic. 

BOLA failures happen when APIs accept object identifiers – account, document, and transaction IDs – without continuously validating ownership or access rights. On paper, this seems trivial to address, but in practice, it breaks as features evolve, organizations add new access paths, or background jobs and integrations reuse endpoints in unintended ways. 

BFLA compounds the problem. Administrative or high-privilege functions are often colocated with user-facing endpoints, differentiated only by role checks or assumed usage patterns. That means attackers can guess paths, flip parameters, reuse HTTP methods, and let legitimate logic do the rest. 

The bottom line here is that these are rarely broken code. They’re applying correct logic in the wrong context

Why Pre-Production Controls Miss Authorization Abuse

Static controls validate correctness, but they miss what really matters: intent. 

Code reviews confirm that checks exist, tests confirm expected responses, and automated scanners validate schemas and status codes. But none of them can determine whether a user should enumerate thousands of objects, export all records, or chain endpoints across workflows. 

Threat models don’t help much either. They assume linear workflows and predictable users. Automation and agentic AI mean that production traffic doesn’t look like that anymore. 

This is why so many authorization failures survive the CI/CD intact. Abuse only becomes visible when real users, real data, and real scale collide. 

How Attackers Exploit “Working” Authorization 

Think of it like this: attackers aren’t looking to bypass authentication – they're using it to their advantage. They log in with valid credentials, obtain legitimate tokens, and issue requests that comply exactly with the API specifications. Then they exploit authorization gaps by: 

  • Manipulating object IDs (BOLA)
  • Accessing privileged functions via predictable paths or methods (BFLA)
  • Chaining endpoints across workflows to escalate access
  • Automating enumeration at speeds humans never reach

From a protocol standpoint, nothing seems wrong. But from a business standpoint, it’s a disaster. Q3 2025 threat research shows exactly this pattern: attackers abusing legitimate access paths to extract data, trigger fraudulent payouts, or pivot across integrations. 

Why This Is a Runtime Problem, Not a Design Failure 

Authorization failures don’t appear in code; they appear in traffic. Just because authorization appears correct at design time, that doesn’t guarantee safe behavior at scale or under automation. 

In production, authorization isn’t a single decision tied to a single request. It’s a pattern that unfolds over time, across sessions, objects, and workflows. Individually, requests may be valid and properly authorized. Collectively, they can expose entire datasets, collapse role boundaries, or enable privilege escalation - without ever triggering a hard failure.

This is where traditional controls fail. Authorization checks evaluate each request in isolation, but attackers don’t operate that way. They chain endpoints, enumerate objects, replay actions, and automate exploration using legitimate credentials. 

At scale, automation turns edge cases into reliable attack techniques. What looks like normal usage at low volume becomes abuse when repeated thousands of times by an authenticated user.

Addressing this requires moving beyond design-time confidence to runtime awareness: visibility into how authorization is actually exercised in live traffic, detection of anomalous access patterns that emerge over time and across contexts, and enforcement that adapts to behavior and intent. 

What Security Leaders Should Do Differently

As a security leader, you need to rethink how you treat authorization:

  • Stop considering authorization “done” once a feature ships
  • Monitor authorization outcomes, not just explicit failures
  • Assume valid credentials will be abused

And start measuring success by what didn’t happen: 

  • Data exposure prevented
  • Logic abuse stopped
  • Business impact avoided

Strong authentication is table stakes. Resilient authorization is a continuous discipline.

The Most Dangerous Requests Are the Valid Ones

The API requests that cause the most damage are rarely suspicious. They’re authenticated, authorized, and indistinguishable from normal traffic – until it’s too late.

Closing the authorization gap means moving beyond design-time confidence to runtime certainty. The future of API security depends less on who logs in and far more on what happens after. 

Book a demo today to find out how Wallarm uses runtime analysis to detect and stop API attacks. 


文章来源: https://lab.wallarm.com/broken-authorization-why-still-works-for-attackers/
如有侵权请联系:admin#unsafe.sh