Web Security Academy Labs 13
- Username enumeration via subtly different responses
- Source code disclosure via backup files
- Referer-based access control
- User ID controlled by request parameter with data leakage in redirect
- Remote code execution via web shell upload
- User ID controlled by request parameter
- SSRF attacks against other back-end systems
- 2FA simple bypass
- Username enumeration via different responses
- User Role Controlled By Request Parameter
- User ID controlled by request parameter, with unpredictable user IDs
- Unprotected admin functionality With unpredictable URL
- Unprotected admin functionality