OWASP top 10 - question series

Question from last Interview


"How can personal data protection mechanisms be bypassed in a system?"


📌 Correct Answer:


Protection is often implemented formally — and breaks at the logic level rather than at the cryptographic level.

Common bypass techniques:

UI masking ≠ real protection
The frontend hides data (****), but the API returns everything → intercept the request and retrieve sensitive data

Broken Access Control (IDOR)
Modify user_id → access other users’ data
Classic example:
/api/user?id=123/api/user?id=124

Excessive data exposure in API responses
The frontend only needs an email, but the backend returns: passport, phone number, address
→ data is already exposed without exploitation

Improper role-based access control (RBAC)
A low-privileged user can call admin-level methods
→ protection exists but is ineffective

Logs and debug data leakage
Sensitive data appears in logs, stack traces, or error responses
→ sometimes triggering an error is enough

Test environments (dev/staging)
Production data with weak security controls
→ easier access, same sensitive data

XSS → full bypass
If XSS exists, attackers can read data from DOM/API on behalf of the user


📌 Strong Answer (concise):

“Most often, personal data protection is bypassed via IDOR, excessive data exposure in APIs, and UI-only masking. Data leaks are also commonly found in logs and test environments. If XSS is present, it typically results in full access to user data.”