Vulnerabilities
Parameter Tampering
Also known as: Web parameter tampering, Request tampering
Definition
An attack in which an adversary modifies parameters in HTTP requests, cookies, or hidden form fields to manipulate application behaviour.
Examples
- Editing a hidden price field in checkout from 100 to 1 before submitting the order.
- Changing role=user to role=admin in a sign-up request.
Related terms
Broken Access Control
A class of vulnerabilities where authorization rules are missing or incorrectly enforced, letting users perform actions or reach data outside their privileges.
Insecure Direct Object Reference (IDOR)
An access-control flaw where an application exposes references to internal objects and lets a user change them to access data that does not belong to them.
Mass Assignment
A vulnerability where an application blindly binds client-supplied request fields to internal object properties, letting attackers set fields they should not control.
Input Validation
Input Validation — definition coming soon.
Web Application Firewall (WAF)
A reverse-proxy filter that inspects HTTP/HTTPS traffic to block web attacks such as SQL injection, XSS, and bot abuse before they reach the application.