IDOR Lead to Data Leak

Mostafa Elguerdawi
2 min readApr 18, 2024

Hello, hackers. My name is Mostafa Elguerdawi. Today, I’ll be discussing a bug I recently discovered with my friend Abdelrhman Allam (sl4x0) while hunting a few days ago.

First, we began by analyzing and understanding the functionality of the application. We discovered that it is an online gaming platform.

While starting the testing process, I visited the /profile page and then searched through the Burp History for any hidden requests.

We came across a request using the HTTP method OPTIONS.

The request contains two parameters: player_id_or_name, which accepts either the user's ID or their name, and event, which specifies the game name.

By sending the request to Repeater and changing the request method from OPTIONS to GET, I was able to retrieve a list of all the games the user has played.

I discovered that by changing the username from my own to another user’s, I was able to retrieve their data as well.

Data we found was :

  • player id(private)
  • match time
  • result(win or lose)
  • his handle at his game
  • game name

The program accepts this as a P3 issue.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Mostafa Elguerdawi
Mostafa Elguerdawi

Written by Mostafa Elguerdawi

Cyber Security Engineer @iSec || Part Time Bug Hunter

Responses (3)

Write a response

ممكن حضرتك تعرفني ازاي بتتعاون مع حد بتقسم الشغل والفلوس علي اساس ايه

--

Hey buddy I had a question ( if I can bypass 403 with option method ) then what to do next like ( fuzz dir and replace post/get to options to view files?) 😕 or anything else you can do after that? And do you have any good write-ups about bypass 403 and 404 ?

--