Bỏ qua

User ID controlled by request parameter with data leakage in redirect

Introduction

Portswigger

Category: Access control vulnerabilities

Write-up date: 10/06/2025

Question: This lab contains an access control vulnerability where sensitive information is leaked in the body of a redirect response.

To solve the lab, obtain the API key for the user carlos and submit it as the solution.

You can log in to your own account using the following credentials: wiener:peter

Point: APPRENTICE

Recon

Logged into wiener account, the url redirect us to /my-account?id=wiener.

At the url param, we can confirm that id param correspond to each user. If you try to access other user, the page redirect you to the login page.

Exploit

Normally user shouldn't have the permission to access other information. But when logic error happened in the server, you can easily access other profile information and steal their information. The page have a mechanism, but it's not enough. User still can access to the page briefly and then got redirected to the login page. Using proxy like Brup suite or Browser developer tool, you can still read the content of that page.

brup_suite.png

Using the burp suite to capture the API key and then submit to complete the lab.

solved.png