Access Control Vulnerabilities

Video Walkthrough :

Writeups :

Lab NameVisit
Insecure direct object referencesView
Method-based access control can be circumventedView
Multi-step process with no access control on one stepView
Referer-based access controlView
URL-based access control can be circumventedView
Unprotected admin functionality with unpredictable URLView
Unprotected admin functionalityView
User ID controlled by request parameter with data leakage in redirectView
User ID controlled by request parameter with password disclosureView
User ID controlled by request parameterView
User role can be modified in user profileView
User role controlled by request parameterView
User ID controlled by request parameter, with unpredictable user IDsView