Day 4: IDOR — How I Hacked a Dating App & Accessed Every User’s Private Data
作者发现了一款流行交友应用中的IDOR漏洞,通过修改URL参数可访问其他用户的私信、照片和位置数据。公司为此支付了8000美元,并展示了详细的测试步骤。 2025-8-7 04:38:15 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Aman Sharma

Last month, I found an IDOR (Insecure Direct Object Reference) vulnerability in a popular dating app that allowed me to view every user’s private messages, photos, and location data — just by changing a number in the URL. The company paid me $8,000 for this critical find. Today, I’ll show you exactly how I did it, step-by-step, with real examples you can test yourself.

free link

Zoom image will be displayed

What is IDOR? (In Plain English)

IDOR happens when an app lets you access data you shouldn’t by modifying a parameter (like a user ID, invoice number, or document ID).

Real-World Analogy:

Imagine a hotel where your room key (e.g., Room 305) also works for Room 306, 307, 308… if you just try different numbers. That’s IDOR.

Step 1: Find an API Endpoint That Uses IDs

  • While using the app, I intercepted requests with Burp Suite and noticed:
GET /api/user/profile?id=12345  
  • My profile ID was 12345, but what if I changed it?

Step 2: Test for Access…


文章来源: https://infosecwriteups.com/day-4-idor-how-i-hacked-a-dating-app-accessed-every-users-private-data-b59a485f455f?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh