Vulnerability Name: IDOR (Insecure direct object references) on [Domain name]
Vulnerability Description: This vulnerability refers to, when a reference to an internal implementation object, such as a file or database key, is exposed to users without any other access control. In such cases, the attacker can manipulate those references to get access to unauthorized data.
Steps to Reproduce:
Login to the application.
Go to the [URL] and intercept the request.
vulnerable parameter value to something else.
Forward the request and check the response.
You should see the information of the another user through your account.
This is IDOR (Insecure direct object references).
Snapshots or video link attached
Impact: IDOR vulnerabilities are most commonly associated with horizontal privilege escalation, but they can also arise in relation to vertical privilege escalation.
Attack Scenario: [Create your own attack scenario according to the workflow of website]
Remediation: The only real solution to this issue is to implement an access control. The user needs to be authorized for the requested information before the server provides it.