March 25, 2024, 12:59 p.m. | Vedavyasan S (@ved4vyasan)

System Weakness - Medium systemweakness.com

Beyond RAM and ROM: IDOR Leads to Unauthenticated File Upload Vulnerability in Indian Government Site

Insecure direct object references to file upload

Hi friends, I’m Vedavyasan S👽, a full-time bug hunter and a cybersecurity enthusiast. In this short time, I’ve secured Apple, Microsoft, Nokia, BBC, UN, IIT, and some government websites of India. 🕵️‍♂️💻

Let’s get to the story. I live in a small village in Kerala. One day, my friends teased me for not knowing the full forms …

bug bounty bug-bounty-tips bugs cybersecurity hacking

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC