The “Unlimited Leave” Hack I Found at My College
一名大学生通过修改URL中的leave ID发现了学校学生portal中的IDOR漏洞,能够绕过导师和宿管审批流程访问其他学生的外出通行证,并负责任地向学校IT团队报告了该漏洞。学校迅速修复了问题。 2025-6-6 05:8:7 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Swarnim Bandekar

“With great power comes great responsibility.”
Uncle Ben (and every ethical hacker ever)

Being a college student living in a hostel means every outing feels like a covert military mission.

You don’t just leave.
You apply for a pass.
Then wait for mentor approval.
Then warden approval.
Then — maybe — you get to step outside for a couple of hours.

At VIT-AP, all of this happens on a student portal called VTOP.

One day, while casually navigating through old outing passes (okay, maybe with Burp Suite open 😅), I noticed something that made me freeze.

After applying for a new leave, I looked at the request that generated the outing form. It looked something like this:

GET /sensored/sensored/sensored/WXXXXXXX?authorizedID=XYZ&_csrf=ABC...

That WXXXXXXX?

That’s the leave ID.

So I had a thought:
What if I changed that ID?
What if I put in an older leave ID that had already been approved?
Or what if I… guessed someone else’s leave ID?

So I tried. I intercepted the request, modified the leave ID, and…

The server didn’t ask questions.
No validation. No permission check.

I was able to:

Download my own outing pass even if it wasn’t approved yet
Access outing passes of other students — just by guessing theirs
Bypass the entire mentor and warden approval workflow

This, my friends, is a textbook IDOR — Insecure Direct Object Reference.

The kind of bug that’s simple, but devastating.

I won’t lie. For a second, I sat there like:

“So… I can leave the hostel anytime now?”
“No more waiting on approvals?”
“I could generate outing passes for anyone?”

Unlimited outings. Unlimited freedom. Zero oversight.

But here’s the thing: that’s not why I do this.

I don’t hack to escape. I hack to secure.

Instead of exploiting it, I did the right thing. I wrote a detailed vulnerability report and sent it to the college IT team. (SDC)

What I included:

  • 📌 A step-by-step breakdown of the bug
  • 📌 The exact affected URL and how to replicate the issue
  • 📌 A video PoC showing the vulnerability in action
  • 📌 Recommendations on how to fix it

To my surprise — and respect — the VIT-AP team took action immediately.
The issue was patched in just 4 days.

No debates, no denials — just good security hygiene. That’s rare. And awesome.

🛡️ Always validate access on the server-side.
🧠 Security isn’t about complex hacks. It’s about overlooked logic.
🤝 Ethical hacking builds bridges — not walls.

This experience was more than just a bug find. It was a crash course in access control, ethics, and responsible disclosure.

You don’t need zero-days to make an impact.
Sometimes, all it takes is a changed ID in a URL — and the right mindset.

So if you’re a budding hacker reading this:
Stay curious. Stay ethical.
Hack not to break things, but to fix them.

Swarnim Bandekar


文章来源: https://infosecwriteups.com/the-unlimited-leave-hack-i-found-at-my-college-4c772df5f8e4?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh