Insecure Object Reference Vulnerability in Web Application Document Handling


Name: Insecure Object Reference Vulnerability in Web Application Document Handling

Product: EMSigner

Affected versions: EMSigner version 2.8.7

Affected Component: EndPoint /Areas/AdhocLogin/GETALLDOCUMENTSWORKDETAILSShareDownload and Web Parameter “DocumentId” and EndPoint /Areas/Share/InternalUserCompletedDownload and Web Parameter “ID”

Attack Type: Remote

Vulnerability Type: Incorrect Access Control

Impact: Information Disclosure

CVSSv3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSSv3.1 Base Score: 6.5

CVE ID(s): CVE-2023-43900


Insecure Direct Object References (IDOR) in EMSigner v2.8.7 allow attackers to gain unauthorized access to application content and view sensitive data of other users via manipulation of the documentID and EncryptedDocumentId parameters.


The “Insecure Object Reference Vulnerability in Web Application Document Handling” vulnerability stems from an insecure handling of object references within the web application’s document management functionality. It occurs because the application allows unauthorized access to sensitive document-related data by inadequately validating and controlling access to specific parameters, such as “DocumentID” and “EncryptedDocumentId.”

Attack Vectors

The vulnerability is exploited through Insecure Direct Object References (IDOR) by manipulating parameter values, particularly the “documentID” and “EncryptedDocumentId” parameters. An attacker gains unauthorized access to application content and can view sensitive data of other users.


During the web application assessment for one of our clients, we performed an assessment on a web app that used the emSigner software. Now, speaking of emSigner, this software is a document automation solution that helps organizations completely eliminate paper from all workflows and create an end-to-end document automation ecosystem, digitizing documents using legally valid digital signatures.

While researching this web app, we discovered a vulnerability that allows an attacker to gain access to application content by manipulating parameter values, specifically documentID and EncryptedDocumentId parameter. An attacker can access unauthorized data information of another user. This can potentially lead to unauthorized access, disclosure of sensitive information


Below, we will explain this vulnerability and the steps needed to exploit it.


Logged in as a low-privilege user [email protected] and clicking on the option to download documents as shown in figure 6, An attacker intercept the request the consultants noticed that the  DocumentId parameter loads numbers sequentially to obtain document information.  Consultants used the burpsuite intruder tool to automatically send numbers between 1 and 999 as shown in figure 1.

Figure 1 DocumentID Enumeration

Consultants analyzed server’s response, focusing on responses with larger size and length as shown in figure 2.


Figure 2 Response HTTP Verification

Consultantans identified responses containing the “DocumentName” and “EncryptedDocumentId” parameters, which reveal the document’s name and it is encrypted identifier.

Figure 3 Response HTTP Verification

With the information in figure x the consultants manipulated the request<EncryptedDocumentId> for download documents from other profiles, providing the “EncryptedDocumentId” value in the “ID” web parameter, allowing to display documents upload from the any as shown in figure 4.

Figure 4 IDOR Exploitation


An updated version of EMSigner is available at the vendor page.


The vulnerability was discovered by Jean Paul Granados from SecPro’s Company ( –




Vulnerability discovered.



Vendor contacted.



Vendor replied acknowledging the report.



Vulnerability patched.



Public Disclosure.

Contact Us

+1 (802) 256-8316

2034 Eisenhower Ave # 170 Alexandria, VA 22314

Monday-Friday: 9am - 5pm

Get Started

Schedule a virtual appointment with our experts for a free External Cybersecurity Diagnostic.

ISO 9001 SGS Certificate Icon
ISO 27001 SGS Certificate Icon

Privacy Policy

Follow us on our social media