Back to directory
WRITEUP #519

Response Manipulation Lead To Premium Feature By Normal User Reward of $500

Privilege EscalationHTTP response manipulationPayment bypass
by@zikolaasec(Abdulrahman badawi)
Bounty
500
Program
-
Published
Jan 24, 2024
Added to HackDex
Jan 25, 2024
Read Full Writeuphttps://medium.com/@zikola1/response-manipulation-lead-to-premium-feature-by-normal-user-reward-of-500-43381f769ab1
RELATED WRITEUPS
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
Escalating From Reader To Contributor In Azure API Management
Privilege Escalation
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Privilege EscalationLocal Privilege Escalation
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
Privilege Escalation
3CX Phone System Local Privilege Escalation Vulnerability
Privilege EscalationLocal Privilege Escalation

Built with ❤️ by Shubham Rawat