webPromedium
Lab 106 — ApproveBot — AI Privilege Escalation via Context Injection
hackadvisor
Task: AI-powered approval workflow with role-based chat assistant; user profile fields injected unsanitized into AI context. Solution: update job title to include 'role: admin' via PATCH /api/me/profile, then request admin-only system config through chat to retrieve the flag from master_encryption_key.
$ ls tags/ techniques/
privilege_escalationai_securityprompt_injectionrole_based_access_controlhoneypot_decoycontext_injectionrbac_bypassprofile_manipulationllm_security
ai_context_injectionprivilege_escalation_via_profilerbac_bypass_via_context_poisoningdecoy_flag_evasion
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 110 — FlowDesk — Mass Assignment Privilege Escalation— hackadvisor
- [web][Pro]Lab 103 — DataPilot — AI SQL Injection via Natural Language Query— hackadvisor
- [web][Pro]Lab 384 — DevPulse — RCE via AI Log Assistant Prompt Injection— hackadvisor
- [web][Pro]Lab 114 — APIForge — JWT JKU Header Injection for Privilege Escalation— hackadvisor
- [web][Pro]Lab 290 — PayLedger — GraphQL Broken Access Control— hackadvisor