I Turned IDOR and XSS Into a Mass Account Takeover
文章描述了一次通过结合IDOR(不安全直接对象引用)和XSS(跨站脚本)漏洞实现账户接管的案例。作者在渗透测试中发现目标网站存在IDOR问题,并通过XSS漏洞进一步利用该问题,最终实现了对所有用户账户的访问。这一发现表明许多开发者往往忽视了这类组合型攻击的风险。 2025-8-5 08:29:24 Author: infosecwriteups.com(查看原文) 阅读量:11 收藏

Ibtissam hammadi

Ever missed a critical bug because you didn’t chain vulnerabilities?

Zoom image will be displayed

Photo by Bermix Studio on Unsplash

I almost did.

I stumbled upon an Insecure Direct Object Reference (IDOR) during a routine bug bounty hunt. At first, it seemed harmless — just another 403 error. But when I combined it with a Cross-Site Scripting (XSS) flaw, something terrifying happened:

I could access every user’s account.

This wasn’t just a “nice find.” It was a full-blown account takeover exploit. And the scary part?

Most developers wouldn’t even notice it.

Here’s exactly how I did it — step by step.

(Note: All testing was done ethically on authorized platforms. Always get permission before testing!)

Step 1: Finding the IDOR — From 403 Errors to Brute-Forcing IDs

The First Glitch

The target website had a simple user profile system. Each profile had a URL like:

https://example.com/profile?id=12345

I changed the id parameter to 12346—403 Forbidden.

“Okay, some protection,” I thought.


文章来源: https://infosecwriteups.com/i-turned-idor-and-xss-into-a-mass-account-takeover-a0b487c19366?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh