This post is Part 2 of my OWASP Top 10 Series
.
You can read Part 1 here
, which covers role-based access to admin features.
Introduction to Broken Access Control This is the second in a series of blog posts about the OWASP Top 10. You can find the OWASP Top 10 List here
.
This is part 2 on the topic of Broken Access Control
. Today we’re taking a look at access control vulnerabilities at the data model layer.