A researcher discovered a critical IDOR vulnerability in an e-commerce platform's address book functionality that allowed account takeover by manipulating user ID parameters in API requests, which was discovered after exploiting a stored XSS in the same feature.
IDOR that allowed me to takeover any users account. | by Vedant Tekale | in InfoSec Write-ups - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
IDOR that allowed me to takeover any users account.
Hello all! My name is Vedant, also known as Vegeta(on twitter). I'm a cybersecurity enthusiast, computer engineering student and a bug…
Vedant Tekale
Follow
InfoSec Write-ups
·
~4 min read
·
February 17, 2021 (Updated: December 31, 2021)
·
Free: Yes
Story of a very lethal IDOR.
Hello all! My name is Vedant, also known as Vegeta(on twitter ). I'm a cybersecurity enthusiast, computer engineering student and a bug bounty hunter. Today I'm going to share one of my best findings with you. So little bit info about the target, it was a RDP let's call it target.com for now. It was basically an online shopping website with lots of functionalities.
So without any further ado, let's get started :)
Phase 1:-
So as target.com had lot's of functionalities for me to play with, I decided to create an account on it and start finding some basic vulnerabilities without doing any recon. So I turned on my burp and started to capture the requests. I didn't find anything interesting in registration or login functionality, but the password reset and some other functionalities were vulnerable for rate limiting attacks. While creating an account on any website I enter my name as
tester
to check for HTML injection and XSS, so while creating an account on target.com I did the same and logged in and visited my dashboard but unfortunately the h1 tag didn't execute. I continued to look for stored XSS in my profile section but any of those fields weren't vulnerable. Then I went to address book section and there also I entered the same payload in all the fields and this time it worked on first name and last name fields :) Then I quickly changed the payload to a simple XSS payload(