Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

User ID controlled by request parameter with data leakage in redirect | Dec 14, 2022

Introduction

Welcome to my another writeup! In this Portswigger Labs lab, you’ll learn: User ID controlled by request parameter with data leakage in redirect! Without further ado, let’s dive in.

Background

This lab contains an access control vulnerability where sensitive information is leaked in the body of a redirect response.

To solve the lab, obtain the API key for the user carlos and submit it as the solution.

You can log in to your own account using the following credentials: wiener:peter

Exploitation

Home page:

Login as user wiener:

In the previous labs, we found that the My account link is supplying an id GET parameter:

What if I change the id value to user carlos?

Hmm… It’s redirecting me to /login

How about I do that in Burp Suite Repeater??

Oh!! We found user carlos API key!

What we’ve learned:

  1. User ID controlled by request parameter with data leakage in redirect