idor

34 articles
sort: new top best
clear filter
0 2/10

A bug bounty writeup describing an IDOR vulnerability in a GraphQL API that allowed unauthorized access to personally identifiable information (PII) due to missing authorization controls.

mrtom001.medium.com · Snehil · 3 hours ago · details
0
rot-ig.medium.com · Ishant Gupta · 4 hours ago · details
0 3/10

Article discusses advanced techniques and methodologies for exploiting IDOR vulnerabilities beyond basic enumeration, targeting authorization flaws in web applications.

rot-ig.medium.com · Ishant Gupta · 4 hours ago · details
0 6/10

A critical IDOR vulnerability discovered through accidental observation of different URL parameter flows in a change-password endpoint, allowing unauthorized access to other users' accounts and subsequent email modification for account takeover.

Harsh Bothra OWASP TOP 10 targetsub.com
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 6/10

Writeup of three bugs submitted to Google VRP: a reflected XSS in artsexperiments.withgoogle.com discovered via ParamSpider and kxss automation, and two IDORs in AppSheet endpoints where access control could be bypassed—one requiring a specific version parameter to exploit. The author details the discovery process, initial rejections, and eventual acceptance with $500 bounties awarded.

Google VRP AppSheet ParamSpider kxss artsexperiments.withgoogle.com appsheet.com Sudhanshu Rajbhar
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 6/10

A researcher discovered a critical IDOR vulnerability in an e-commerce platform's address book functionality that allowed account takeover by manipulating user ID parameters in API requests, which was discovered after exploiting a stored XSS in the same feature.

Vedant Tekale Vegeta
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 7/10

A bug bounty writeup demonstrating an account takeover vulnerability combining IDOR and weak encryption in a password reset function. The attacker decrypted Zlib-compressed tokens, discovered an Adler-32 checksum constraint, located a Transaction_Token endpoint via directory fuzzing, and automated exploitation to forge valid password reset links for arbitrary accounts.

Mayank Pandey CyberChef Zlib Adler-32 Python
mayank-01.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 6/10

A researcher discovered an IDOR vulnerability in a WebSocket-based signup flow that allowed account takeover by manipulating UUID parameters during user registration, enabling email changes on arbitrary accounts without authentication.

Mohsin Khan example.com Burp Suite JWT WebSocket
mokhansec.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 6/10

A security researcher discovered an IDOR vulnerability in an e-commerce platform where unauthorized access to user account data (name, address, credit card details) could be achieved by exploiting misconfigured CORS that exposed random checkout hashes to third-party integrations, allowing attackers to enumerate and access arbitrary user wallets via predictable endpoints.

Harsh Parekh notmarshmllow
notmarshmllow.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10

An IDOR vulnerability in an e-commerce application's address management API allowed exposure of other users' sensitive information (names, addresses, phone numbers) through a POST request to set default address endpoint that returned 200 with empty body but still processed sequential address IDs. The vulnerability was discovered when the payment page displayed a different user's address data.

Rahul Varale
rahulvarale.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0
vulnerability
rahulr.in · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
vulnerability
CVE-2019-17558
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
blog.witcoat.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
websecblog.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
ansariosama.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
websecblog.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
vulnerability
footstep.ninja · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0
0
hunterx461.medium.com · Tabrez Mukadam · 1 day ago · details
more →