Vulnerability: A01:2025 – Broken Access Control
Broken Access Control is the most critical web application security risk, according to the OWASP Top 10 2025 list (A01). It occurs when an application fails to enforce proper authorization, allowing users to view or modify resources they are not permitted to access. When access control is broken, threat actors can act outside of their intended permissions. This can manifest itself in several ways:
- Horizontal Privilege Escalation : When a user gains access to another user’s data or actions at the same privilege level.
- Vertical Privilege Escalation : When a user gains higher‑level privileges, such as performing admin‑level operations.
- Insecure Direct Object References (IDOR) : When attackers access restricted resources by directly manipulating object identifiers (e.g., IDs in a URL)
💡 Note: In the following exercises, we will focus only on Horizontal Privilege Escalation and Vertical Privilege Escalation.
- Business Impact: Unauthorized modifications could lead to incorrect incident handling, data tampering, and workflow disruption.
- Compliance Risk: Violates OWASP Top 10 A01 and the principle of least privilege.
- Security Risk: Malicious or careless users could alter other peoples' work, close tickets improperly, or delete evidence.
CAP provides a multi-layered security approach:
-
Authentication: Verifies the user identity (managed by XSUAA/Identity Authentication service).
-
Authorization: Controls what authenticated users can do.
- Role-based (
@requiresannotations): Controls access to functions or resources based on predefined organizational roles assigned to the user. - Instance-based (
@restrictannotations): Limits which specific records or instances a user can interact with (e.g., a user can only see data they created). - Programmatic checks (in service handlers): Used when annotations are insufficient for complex business rules.
- Role-based (
There are two exercises related to this topic. Please ensure your environment is prepared before starting:
- Completed Environment Setup and Initial Deployment.
- Ensure the following systems are active:
- SAP HANA Cloud: SAP HANA Database is Running, see section Getting Started - 6.6.1. Check and Start SAP HANA Database
- SAP Business Application Studio (BAS): Launch BAS and verify that your development space is in a "Running" state.
- Cloud Foundry Space: The application incident-management-srv is started and running in your space. see section Check and Start the incident-management-srv Application
Once your systems are verified, proceed with the following exercises:
Continue to Exercise 1.1 - Horizontal Privilege Escalation
and then to Exercise 1.2 - Vertical Privilege Escalation
When you have finished the two exercises related to Broken Access Control
continue to - Exercise 2 - SQL Injection