Authorization Bypass via Forced Browsing
Also Known As:
Improper Authorization, Privilege Abuse
Quick Introduction to the Topic:
Vector Operation Method:
Malicious users can bypass the authorization enforcement by directly accessing protected resources that require higher privileges than they currently posses.