Sometimes the smallest input validation issues can snowball into serious business logic flaws. This bug is a great example — a simple newline character (%0a) in a folder name was enough to block owners from revoking access rights, leaving attackers stuck with elevated privileges.
Press enter or click to view image in full size
CollabSpace(pseudo name for private bbp product) is a cloud-based platform for project collaboration, offering resource sharing, folder management, and granular access controls. Owners can share resources and grant collaborators rights such as View, Edit, or Transfer Edit Rights.
To maintain control, project owners should always be able to revoke or update collaborator access. However, this restriction was bypassed by abusing folder naming logic.
The vulnerability occurred because the backend failed to validate folder names properly. By creating a folder with a newline character (%0a) at the start of its name, the system broke critical permission workflows.
Join Medium for free to get updates from this writer.
Here’s the malicious request:
POST /api/v1/fs?path=&rid=<resource_id>&dirname=%0aattackerfolder HTTP/2
Host: collabspace.com
This created a folder with a malformed name that disrupted backend path handling.
Result: The attacker retains their access indefinitely.
The program acknowledged that although the confidentiality impact was low, this was a well-crafted and creative finding that broke ownership workflows, which earned a bonus.
This was a unique case where a simple newline injection caused project owners to lose control over collaborator access. It highlights how critical input validation is for access control and ownership workflows.
Until next time, happy hacking! 🚀
💬 What’s your experience with business logic bugs?
Follow me on Twitter: @a13h1_
Keep clapping, commenting, and sharing your thoughts — your support motivates me to share more real bug bounty stories!