Broken Object Fiesta: How I Used IDOR, No Auth, and a Little Luck to Pull User Data
文章描述了一位安全研究员在测试中发现一个API漏洞的过程,该漏洞允许未认证访问获取敏感用户数据,展示了访问控制的重要性。 2025-6-6 05:1:38 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Iski

Free Link 🎈

Hey there!😁

Image by Gemini Ai

I once ordered biryani and got plain rice. That same week, my barber gave me a haircut that made me look like a QR code. Nothing was going my way… until I found an IDOR that handed me sensitive user data like candy on Halloween. 🎃

It started like every sad bug hunter tale — one browser tab open, 45 terminal windows running, and hopes lower than my bank balance. But what happened next restored my faith in broken access control. Let’s go!

I began with my regular recon ritual:

subfinder -d target.com -o subs.txt
httpx -l subs.txt -status-code -title -o live.txt
gau --subs target.com > params.txt

While scrolling through params.txt, I found this endpoint:

https://api.target.com/v2/profile/getProfileDetails?id=123456

Looks boring, right? But here’s the kicker — this API worked without authentication. Yep, no tokens, no cookies, just vibes.


文章来源: https://infosecwriteups.com/broken-object-fiesta-how-i-used-idor-no-auth-and-a-little-luck-to-pull-user-data-4b8d8627fb39?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh