webProeasy
Lab 198 — PayrollSync — Broken Auth via GraphQL Introspection
hackadvisor
Task: HR/payroll platform with GraphQL API, given employee credentials. Solution: Used GraphQL introspection to discover adminUsers query, exploited missing authorization to steal admin API key, then accessed system config containing the flag.
$ ls tags/ techniques/
authorization_bypassgraphql_schema_enumerationapi_key_theftintrospection_attack
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 290 — PayLedger — GraphQL Broken Access Control— hackadvisor
- [web][Pro]Lab 251 — PulseBoard — IDOR via Unauthenticated GraphQL User Profile Query— hackadvisor
- [web][Pro]Lab 298 — PayLedger — SQL Injection via GraphQL Date Filters— hackadvisor
- [web][Pro]Lab 304 — TeamVault — Broken Access Control in GraphQL Mutation— hackadvisor
- [web][Pro]Lab 303 — DevGateway — Broken Access Control in Admin API— hackadvisor