Nov. 21, 2023, 4:05 a.m. | Abhi Sharma

InfoSec Write-ups - Medium infosecwriteups.com

Discover how an IDOR vulnerability allowed unauthorized budget changes in Private Program. Learn the steps to reproduce this security flaw and its potential impact on user privacy.

IDOR vulnerabilities can potentially expose user data or allow unauthorized access to sensitive features. In this blog post, I’ll walk you through a recent discovery I made while testing Examlent.com(virtual name of privat program domain), a platform where individuals seek job opportunities and employers find potential candidates. This IDOR flaw had the potential …

access blog blog post budget bug bug bounty change cybersecurity data discover discovery expose features flaw hacking idor idor vulnerability impact learn privacy private program programming security security flaw sensitive testing unauthorized access user data user privacy vulnerabilities vulnerability

Malware Analyst - TASO / Active Secret

@ Peraton | Arlington, VA, United States

Information Security Engineer

@ Deel | Anywhere (APAC)

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, DC, Washington (1125 15th St NW)

Director, Security Engineering

@ Warner Bros. Discovery | GA Atlanta 1050 Techwood Drive NW

Consultant Senior Securité Réseaux

@ Devoteam | Tunis, Tunisia

SOC Analyst, Mid

@ Peraton | Washington, DC, United States