webPromedium
PipeForce
hackadvisor
Task: CRM deal pipeline with role-based access control, Django ORM filtering via query parameters without whitelisting. Solution: Injected _connector=OR parameter to change filter logic from AND to OR, bypassing owner-based access control to read confidential deals.
$ ls tags/ techniques/
access_control_bypassdjango_orm_connector_injectionquery_logic_manipulation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 373 — PipelineIQ — Django ORM Filter Injection— hackadvisor
- [web][Pro]Lab 86 — DealForge — SQL Injection via Backslash Escape Bypass of Quote-Doubling in H2— hackadvisor
- [web][Pro]Lab 327 — PipelineIQ — NoSQL Injection Authentication Bypass— hackadvisor
- [web][Pro]Lab 329 — PipelineIQ — NoSQL Injection Authentication Bypass— hackadvisor
- [web][Pro]Lab 335 — LeadForge — XPath Injection in XML-Based CRM— hackadvisor