Day 4: IDOR — How I Hacked a Dating App & Accessed Every User’s Private Data
作者发现了一款流行交友应用中的IDOR漏洞,通过修改URL参数可获取其他用户的私密信息,并获得8,000美元奖励。文章详细介绍了漏洞的发现过程和测试方法。 2025-8-7 04:38:15 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Aman Sharma

Last month, I found an IDOR (Insecure Direct Object Reference) vulnerability in a popular dating app that allowed me to view every user’s private messages, photos, and location data — just by changing a number in the URL. The company paid me $8,000 for this critical find. Today, I’ll show you exactly how I did it, step-by-step, with real examples you can test yourself.

free link

Zoom image will be displayed

What is IDOR? (In Plain English)

IDOR happens when an app lets you access data you shouldn’t by modifying a parameter (like a user ID, invoice number, or document ID).

Real-World Analogy:

Imagine a hotel where your room key (e.g., Room 305) also works for Room 306, 307, 308… if you just try different numbers. That’s IDOR.

Step 1: Find an API Endpoint That Uses IDs

  • While using the app, I intercepted requests with Burp Suite and noticed:
GET /api/user/profile?id=12345  
  • My profile ID was 12345, but what if I changed it?

Step 2: Test for Access…


文章来源: https://infosecwriteups.com/day-4-idor-how-i-hacked-a-dating-app-accessed-every-users-private-data-b59a485f455f?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh