Chaining an IDOR with a business-logic error to achieve critical impact

from blog Posts on jub0bs.com, | ↗ original
I recently stumbled upon a critical instance of broken-access control, and I thought its story would make for an interesting blogpost. I’ve deliberately omitted some details (e.g. irrelevant HTTP headers) in the interest of simplicity and concision. Morever, all clues to the identity of the organisation I was hacking have been expunged from this...