webProeasy

Lab 27 — AdReach — CSRF + IDOR Account Takeover via Profile Update

hackadvisor

Task: advertising campaign management platform with profile update API that uses client-supplied u_id without authorization checks, plus password reset endpoint that leaks tokens in response. Solution: exploit IDOR in /api/profile/update to change admin's email, then abuse password reset token disclosure to take over admin account and access private workspace containing the flag.

$ ls tags/ techniques/
idor_exploitationsequential_id_enumerationparameter_tamperingdecoy_flag_evasionpassword_reset_abuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups