Broken Function Level Authorization
Where BOLA is all about accessing resources that do not belong to you, BFLA is all about performing unauthorized actions
Understanding BFLA
Hunting for Broken Object Level Authorization (BOLA) Vulnerabilities
Resource Identifier (Resource ID)
2. Requests that Access Resources
3. Access Control Issues
Testing Strategy
A-B-A Testing Approach
Example Attack
Caution in BFLA Testing
Last updated