Skip to content
  • 0 Votes
    1 Posts
    0 Views
    bugbountyshorts@infosec.exchangeB
    How I Found a Critical IDOR Leading to Account Takeover in Two EdTech PlatformsThe vulnerability was an Insecure Direct Object Reference (IDOR) in two EdTech platforms, allowing account takeover through user profile manipulation. The flaw resulted from improper input validation, leading to user profiles being accessible via URL parameters. By constructing carefully crafted URLs containing other users' IDs, the researcher accessed their profiles without proper authentication. The attack vector involved using Burp Suite's Intruder tool to automate IDOR requests, sending payloads with incremental user IDs. The mechanism revolved around the application trusting the provided IDs without verifying their ownership or performing proper authorization checks. This IDOR flaw enabled the researcher to impersonate other users, potentially causing serious account takeovers. The researcher did not disclose specific bounty amounts or program responses. Proper mitigation requires implementing strict input validation and enforcing proper access control checks. Key lesson: Always validate user inputs and enforce proper access control to prevent unauthorized data access. #BugBounty #Cybersecurity #WebSecurity #IDOR #AccountTakeover #InputValidationhttps://medium.com/@impyhacker/how-i-found-a-critical-idor-leading-to-account-takeover-in-two-edtech-platforms-44439a66ceb3?source=rss------bug_bounty-5
  • 0 Votes
    1 Posts
    6 Views
    bugbountyshorts@infosec.exchangeB
    IDOR Mastery: From Basic ID Changes to Advanced Techniques That Pay $10K+ BountiesThis article details Insecure Direct Object Reference (IDOR) exploitation techniques, some resulting in $10,000+ bug bounty payouts. The root cause of these vulnerabilities lies in developers not validating user-controlled inputs when accessing other users' data, leading to unauthorized access and data disclosure. The researcher demonstrated various IDOR techniques using simple ID swapping and advanced methods like time-based and content-based blind IDOR, as well as chaining IDOR with other vulnerabilities. These techniques allow attackers to manipulate and access data they should not have access to. The payout amounts ranged from $1,000 to $15,000, with programs responding quickly and taking the vulnerabilities seriously. Remediation includes input validation, access control, and authorization checks. Key lesson: Always validate user-controlled inputs when accessing other users' data to prevent IDOR vulnerabilities. #BugBounty #WebSecurity #IDOR #Cybersecurity #InputValidationhttps://medium.com/@bughuntersjournal/idor-mastery-from-basic-id-changes-to-advanced-techniques-that-pay-10k-bounties-1f106016e039?source=rss------bug_bounty-5