webPromedium
Корпоративное хранилище (Corporate Storage)
hackerlab
Task: Flask file storage app with source code provided. Solution: Exploited HTTP Parameter Pollution combined with IDOR - the app uses first user_id for database query but last user_id for access check, allowing access to admin files by passing two user_id parameters.
$ ls tags/ techniques/
idor_exploitationhttp_parameter_pollutionaccess_control_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Ghost Cloud— hackerlab
- [web][Pro]90 - Самое надежное хранилище (The Most Secure Storage)— duckerz
- [web][Pro]Привилегированный гость (Privileged Guest)— hackerlab
- [web][Pro]SecretKeeper— hackerlab
- [web][Pro]Обычная страница— hackerlab