webPromedium
TeamForge — IDOR to Owner Account Takeover via Weak Passwords
hackadvisor
Task: Multi-tenant team collaboration platform with Owner/Admin/Member RBAC; given Member account. Solution: IDOR on /org/{id}/team leaked all user emails and roles cross-org, then guessed Owner password (alex123) to access security settings containing the flag.
$ ls tags/ techniques/
nodejsinformation_disclosureidorexpressprivilege_escalationbroken_access_controlweak_passwordsrbacmulti_tenanthoneypot_decoy
idor_exploitationbroken_access_controlcredential_guessingpassword_pattern_attackdecoy_flag_evasion
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]TeamForge — Privilege Escalation via IDOR and Weak Passwords— hackadvisor_kubstu
- [web][Pro]Lab 7 — TeamForge - Privilege Escalation via Invitation Flow— hackadvisor
- [web][Pro]Lab 116 — InsightForge — IDOR via Undocumented Internal API— hackadvisor
- [web][Pro]Lab 109 — TaskForge — IDOR in Account Settings API— hackadvisor
- [web][Pro]Lab 99 — CashPilot — IDOR in Team Member Management— hackadvisor