codeburst

Bursts of code to power through your day. Web Development articles, tutorials, and news.

Follow publication

Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART 2)

In this blog i have added all endpoints on which you can look for IDOR vulnerabilities. For Part 1 you can visit this Link

#6. IDOR — Comment on any post

Yes!! This time i was able to comment on any post. It doesn’t matter if it has “only-me” privacy ;)

Due to improper validation of streamid parameter at Server side leads to Comment on anyone’s Post Remotely using IDOR Vulnerability at Following Endpoint .

Only me Privacy. No one can see the post

victim posted “anyone up who can comment here?… no one can :D” this was the biggest challenge for an attacker to comment on that post.

Hacker not able to see the post

but Attacker was not able to see the victim’s post because it has only me privacy then how can he comment?

Commenting on post which doesn’t have any privacy

Commenting on post (which doesn’t have any privacy, everyone can see and comment on it) makes following Request to server.

Request Making To Server

As you can see there is streamid parameter in POST Data values which is unique id of every post , So i tried changing value of user’s-streamid which have “everyone privacy” to victim’s-streamid which have”Only-me privacy” and able to comment on victim’s post.

Challenge Accepted ;)

After finding the above IDOR vulnerability which contains “only-me” privacy, my mind click that i should try to change privacy of user’s . I tried to change privacy settings of other users but unable to change because there was a security.

As my Brother AqeelAsif always says “Where there is security There is a vulnerability” so with this attitude again i have conducted a test and able to change user’s Post Privacy ;)

#7. IDOR — Change or Control Anyone’s Post Privacy

Due to improper validation of streamid at Server side leads to Change anyone’s Post Privacy Remotely using IDOR Vulnerability at Following Endpoint

User’s Post

The Dev’s intention was Hacker should not be able to change Victim’s Post Privacy. Serious?? :p

Attacker’s Post

On clicking *Only Me* Option makes following Request to the server .

Request Making To Server

As you can see there is Streamid parameter in POST Data values which is unique id of post .So i tried changing it to another posts streamid value

Changed Attackers streamid value with victims streamid value

and able to Change and Control Victim’s Post Privacy.

Control other users post privacy

#8. IDOR — Repost Any Post More Than One Time

Due to improper validation of postid at Server side leads to Repost any Post more than one time Remotely using IDOR Vulnerability at Following Endpoint

The developers intention was one user can repost any post only once. if user try again to repost the same post the site shows error “Unable to repost. You Have already repost the same post” . I tried to repost other post like below

On clicking *Repost* Option makes following Request to the server .

Request Making To Server

As you can see there is postid parameter in POST Data values which is unique id of post .So i tried changing it to postid value which is already reposted.

Changed postid

and able to Repost the same post more than one time

Repost Two times

By following same method i was able to repost many times .

#9. Taking Privileges of blogs (Create, edit, delete etc)

Create blog from attacker account > edit blog > capture Request with burp > Change Attackers blog_id with Victims blog_id > Privilege Escalation

#10. Remove Linked Social Accounts From Any Account.

Here is the list of all endpoints on which i have reported IDOR vulnerability

After reporting all issues one by one to the website i got a quick response from CEO ;)

My First Highest four-digits Bounty

Published in codeburst

Bursts of code to power through your day. Web Development articles, tutorials, and news.

Written by Mohammed Abdul Raheem

Product Security Engineer and Ethical Hacker

Responses (1)

Write a response