User ID controlled by request parameter with data leakage in redirect
Description
This lab contains an access control vulnerability where sensitive information is leaked in the body of a redirect response.
Reproduction and proof of concept
Log in with
wiener:peter
and access the account page.Send the request to Burp Repeater.
Change the “id” parameter to
carlos
.Observe that although the response is now redirecting you to the home page, it has a body containing the API key belonging to
carlos
.Submit the API key.
Exploitability
An attacker will need to log in, obtain the API key for the user carlos
and submit it as the solution.