GraphQL Security: How I Found and Exploited Critical IDOR and Authorization Bypass in a…
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,了解主要信息。 文章标题是“如何通过发现GraphQL introspection和批量查询漏洞赚取12,500美元”,看起来是关于安全漏洞的。接着,TL;DR部分提到作者在 fintech 公司的API基础设施中发现了GraphQL introspection公开启用,导致完整模式枚举。利用批量查询处理和IDOR漏洞,访问并修改了其他用户的财务交易,获得了CVSS 9.1评分和12,500美元奖励。 接下来是目标和范围部分,作者在HackerOne上找到了一个名为FinanceFlow的 fintech 启动公司,处理小企业的支付流程。他们有一个GraphQL API端点,很多猎手忽视了这一点,所以作者觉得有机会。 现在我要把这些信息浓缩到100字以内。重点包括:发现GraphQL introspection漏洞、批量查询和IDOR漏洞、访问修改交易、CVSS评分、奖励金额。 可能的结构:在 fintech 公司API中发现GraphQL introspection漏洞,利用批量查询和IDOR漏洞访问并修改交易,CVSS 9.1评分,获得12,500美元奖励。 检查字数是否合适:“作者在一家金融科技公司的API中发现GraphQL introspection公开启用,并利用批量查询和IDOR漏洞访问修改用户交易,获CVSS 9.1评分及12,500美元奖励。” 这样大约46个字,符合要求。 </think> 作者在一家金融科技公司的API中发现GraphQL introspection公开启用,并利用批量查询和IDOR漏洞访问修改用户交易,获CVSS 9.1评分及12,500美元奖励。 2026-4-4 10:31:44 Author: infosecwriteups.com(查看原文) 阅读量:22 收藏

Krishna Kumar

How I earned $12,500 finding GraphQL introspection and batch query vulnerabilities in a fintech startup’s API infrastructure

TL;DR: During a bug bounty engagement on a fintech target, I discovered that GraphQL introspection was publicly enabled, allowing full schema enumeration. By exploiting batch query processing and an Insecure Direct Object Reference (IDOR) vulnerability, I was able to access and modify other users’ financial transactions. The vulnerability earned a CVSS 9.1 score and a $12,500 payout.

Press enter or click to view image in full size

🎯 Target & Scope — Finding My Prey

Let me set the stage for you. It was a typical Tuesday night, coffee brewing, and I was scrolling through HackerOne looking for my next target. That’s when I saw a private program — let’s call them “FinanceFlow” (fictional name) — a growing fintech startup handling payment processing for small businesses.

The program had a solid scope: web application, mobile API, and importantly — a GraphQL API endpoint listed explicitly. Most hunters overlook GraphQL, which is exactly why I got excited. Uncharted territory means less competition and higher chances of finding something juicy.


文章来源: https://infosecwriteups.com/graphql-security-how-i-found-and-exploited-critical-idor-and-authorization-bypass-in-a-42ab78e13642?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh