Multi-Step Process with No Access Control on One Step
文章描述了一个多步骤角色变更流程中的访问控制漏洞。攻击者可利用此漏洞绕过部分安全检查,在未授权的情况下将普通用户晋升为管理员角色。 2025-6-18 06:28:14 Author: infosecwriteups.com(查看原文) 阅读量:16 收藏

Bash Overflow

[Write-up] Broken Access Control: Exploiting a Multi‑Step Role Change Flow for Unauthorized Admin Promotion.

🔓 Free Link

Multi-Step Process with No Access Control on One Step

Disclaimer:
The techniques described in this document are intended solely for ethical use and educational purposes. Unauthorized use of these methods outside approved environments is strictly prohibited, as it is illegal, unethical, and may lead to severe consequences.

It is crucial to act responsibly, comply with all applicable laws, and adhere to established ethical guidelines. Any activity that exploits security vulnerabilities or compromises the safety, privacy, or integrity of others is strictly forbidden.

  1. Summary of the Vulnerability
  2. Steps to Reproduce & Proof of Concept (PoC)
  3. Impact

This lab demonstrates a broken access control vulnerability in a multi-step role change process on an admin panel. The process is intended for administrators to promote or demote user roles.

Users normally should not have access to any admin functionality, including changing roles.


文章来源: https://infosecwriteups.com/multi-step-process-with-no-access-control-on-one-step-a17dba1a4415?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh