OWASP Broken Access Control - Manipulating User Actions
Learn how to exploit broken access control vulnerabilities to manipulate user actions, such as posting feedback or reviews on behalf of other users.

Lab Modules
Lab Overview
Broken Access Control vulnerabilities occur when applications fail to enforce proper restrictions on user actions, allowing attackers to perform unauthorized activities. This lab explores how attackers can exploit insufficient access controls to manipulate actions, such as posting feedback or reviews, on behalf of other users. These vulnerabilities can undermine the integrity of user data and erode trust in the application.
In this lab, you will analyze and exploit broken access control vulnerabilities in the Contact Us and Product Review features of OWASP Juice Shop. By manipulating hidden fields and tampering with request payloads, you will simulate unauthorized actions to gain a deeper understanding of how to identify and prevent such issues.
Objectives
Upon completion of this lab, you will be able to:
- Understand the basics of broken access control vulnerabilities in user actions.
- Identify and manipulate hidden fields to submit feedback as another user.
- Tamper with request payloads to post or modify product reviews on behalf of another user.
- Appreciate the risks and mitigation strategies for broken access control.
Who is this lab for?
This lab is designed for:
- Developers seeking to understand how broken access controls can lead to unauthorized actions.
- Security professionals learning how to identify and exploit broken access controls.
- IT professionals interested in strengthening application security through better access control mechanisms.
