“From $500 to $5,000: How Chaining IDOR and XSS Led to Mass Account Takeovers (Ethical Hacking…
安全研究员发现某SaaS平台widget功能存在IDOR漏洞,通过修改UUID可无限制访问其他用户widget,导致账户接管风险。该平台服务超10万家公司,缺乏二次认证机制。 2025-7-16 10:32:3 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Aman Sharma

As a security researcher, I’ve uncovered dozens of vulnerabilities, but one particular finding stands out — where a simple IDOR flaw snowballed into a critical account takeover chain. This case study reveals how modern web defenses can fail and why proper security layers matter.

friend link | free link

While testing a popular SaaS platform’s widget feature, I noticed each widget was accessed via:

https://app.target.com/widgets/edit?uuid=123e4567-e89b-12d3-a456-426614174000

Changing the UUID granted me full editing rights to any user’s widget. No permission checks. No warnings. Just unfettered access — a textbook Insecure Direct Object Reference (IDOR) vulnerability.

Why This Was Dangerous:

  • Widgets could be embedded on public websites
  • The platform served over 100,000 businesses
  • No secondary authentication for sensitive operations

文章来源: https://infosecwriteups.com/from-500-to-5-000-how-chaining-idor-and-xss-led-to-mass-account-takeovers-ethical-hacking-a55de6e59a71?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh