webProeasy
Lab 294 — TeamForge — GraphQL Self-Escalation via UpdateMembership
hackadvisor
Task: SaaS workspace platform with GraphQL API; given member account with manage_members permission. Solution: GraphQL introspection revealed updateMembership mutation that lacks self-modification check — escalated own membership to full_admin, then queried adminSecrets for the flag.
$ ls tags/ techniques/
broken_access_controlgraphql_introspectionauthorization_bypassself_privilege_escalation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 304 — TeamVault — Broken Access Control in GraphQL Mutation— hackadvisor
- [web][Pro]Lab 7 — TeamForge - Privilege Escalation via Invitation Flow— hackadvisor
- [web][Pro]TeamForge — Privilege Escalation via IDOR and Weak Passwords— hackadvisor_kubstu
- [web][Pro]Lab 290 — PayLedger — GraphQL Broken Access Control— hackadvisor
- [web][Pro]Lab 217 — PlanForge — Broken Authorization in Subscription Upgrade— hackadvisor