webPromedium

Корпоративное хранилище (Corporate Storage)

hackerlab

Task: Flask file storage app with source code provided. Solution: Exploited HTTP Parameter Pollution combined with IDOR - the app uses first user_id for database query but last user_id for access check, allowing access to admin files by passing two user_id parameters.

$ ls tags/ techniques/
idor_exploitationhttp_parameter_pollutionaccess_control_bypass

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups