This lab has an admin panel at /admin, which identifies administrators using a forgeable cookie.
With this arrangement, we can access admin panel.
Lab: User role can be modified in user profile
This lab has an admin panel at /admin. It's only accessible to logged-in users with a roleid of 2.
After this request, we got administrator rights. There is no control on the post request. So we can change privilege.
Lab: URL-based access control can be circumvented
This website has an unauthenticated admin panel at /admin, but a front-end system has been configured to block external access to that path. However, the back-end application is built on a framework that supports the X-Original-URL header.
There is weak access control on id parameter. We can access any user data at response. It is redirecting to login page. But the data is in redirect body.
Lab: User ID controlled by request parameter with password disclosure
This lab has user account page that contains the current user's existing password, prefilled in a masked input.
There is no access control on id parameter. We can access any user data with it. The data can lead to vertical privilege escalation.
Lab: Insecure direct object references
Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly.
This lab stores user chat logs directly on the server's file system, and retrieves them using static URLs.
We can download any chat document with visiting the url.
Lab: Multi-step process with no access control on one step
This lab has an admin panel with a flawed multi-step process for changing a user's role.
The workflow is as follows:
GET /admin
POST /admin-roles
username=carlos&action=upgrade
POST /admin-roles
action=upgrade&confirmed=true&username=carlos
GET /admin
GET /admin - Admin interface only available if logged in as an administrator
POST /admin-roles username=wiener&action=upgrade - "Unauthorized"
Lab: Referer-based access control
This lab controls access to certain admin functionality based on the Referer header.