User ID controlled by request parameter, with unpredictable user IDs¶
Description¶
This lab has a horizontal privilege escalation vulnerability on the user account page, but identifies users with GUIDs.
Reproduction and proof of concept¶
Find a blog post by
carlos.Click on
carlosand observe that the URL contains his user ID. Make a note of this ID.
https://0a5c000f033d4106c25eb15600bc00a8.web-security-academy.net/blogs?userId=05bac43e-8599-476a-8650-16514c64a2d9
Log in with
wiener:peterand access the account page.Change the “id” parameter to the saved user ID.
Retrieve and submit the API key.
Exploitability¶
An attacker will need to log in, find the GUID for carlos, then submit his API key as the solution.