User ID controlled by request parameter with data leakage in redirect
This lab contains an access control vulnerability where sensitive information is leaked in the body of a redirect response.
Upon logging in with the provided credentials, I navigated to my account page. Using Burp Repeater, I inspected and modified requests. I changed the "id" parameter to "carlos." Despite the response redirecting me to the home page, I scrutinized the body to find the API key associated with carlos. Finally, I submitted carlos' API key to complete the process.
PreviousUser ID controlled by request parameter, with unpredictable user IDsNextUser ID controlled by request parameter with password disclosure
Last updated