Introduction Almost every time we do a penetration test or code review, we find problems with authorization. Sometimes we call these horizontal or vertical privilege escalation. Sometimes we call it instance based restriction gaps or function based restriction gaps. Ultimately, many applications fail to implement clear restrictions on who can do what. This post attempts to revisit these [...]