Back to directory
WRITEUP #592

500$ Access Control Bug: Performed Restricted Actions in Developer Settings by low level user.

Privilege EscalationBroken Access Control
by@a13h1_(Abhi Sharma)
Bounty
500
Program
ExamNote
Published
Jan 7, 2024
Added to HackDex
Jan 8, 2024
Read Full Writeuphttps://medium.com/@a13h1/500-access-control-bug-performed-restricted-actions-in-developer-settings-by-low-level-user-b4ecaa6d1aa1
RELATED WRITEUPS
Vestaboard: Exploring Broken Access Controls and Privilege Escalation
Privilege EscalationBroken Access Control
How I Earned $469 Bounty: Bypassing Plan Restriction
Privilege EscalationBroken Access Control
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
Escalating From Reader To Contributor In Azure API Management
Privilege Escalation
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Privilege EscalationLocal Privilege Escalation

Built with ❤️ by Shubham Rawat