Back to directory
WRITEUP #359

Using E-Notation to bypass Access Control restrictions to access arbitrary user PII-discussions

IDORBroken Access Control
by@KeiZo_Zo(Keizo)
Program
-
Published
Apr 12, 2024
Added to HackDex
Jul 15, 2024
Read Full Writeuphttps://medium.com/@keizobugbounty/using-e-notation-to-bypass-access-control-restrictions-to-access-arbitrary-user-pii-discussions-1fa014b544d4
RELATED WRITEUPS
A Creative Way To Get Someones YouTube Videos Deleted + A Copyright Strike Against Their YouTube Channel
IDORBroken Access Control
Zomatoooo! IDOR in Saved Payments
IDOR
How I got my first $13500 bounty through Parameter Polluting (HPP)
IDORXSS
The Butterfly Effect: Turning Overlooked - Misconfigurations into Zero Click Account Takeover
APIGraphQL
Vestaboard: Exploring Broken Access Controls and Privilege Escalation
Privilege EscalationBroken Access Control

Built with ❤️ by Shubham Rawat