Idor

  • Published on
    The application has the following vulnerabilities: endpoint enumeration via FUZZ, SQL Injection, remote command execution (RCE), and privilege escalation via Linux capabilities.
  • Published on
    This is a HackingClub championship machine where we found an IDOR that provides initial access and Privilege Escalation through XAMPP.