$ls -la writeups/

Bug Bounty Writeups

Detailed technical writeups of vulnerabilities discovered during security research and bug bounty hunting.

Image Upload Gone Wild: Blind SQLi to Superadmin in Disguise

CVSS 9.8Critical

Discovered blind SQL injection hidden in a filename through file upload, leveraged via second-order logic to escalate privileges to superadmin. Combined creativity, SQL trickery, and business logic abuse to achieve full compromise.

#Blind SQL Injection#Second-Order Injection#Privilege Escalation#Business Logic

"checkuserlogin: yes" — The Header That Gave Me SuperAdmin Powers

CVSS 9.8Critical

A forgotten developer header left active in production allowed global authentication bypass. Simply adding 'checkuserlogin: yes' to any request granted full SuperAdmin privileges and unrestricted PII access.

#Broken Access Control#Design Flaw#Auth Bypass#Account Takeover#PII Exposure

OTP Bypass to Full Data Exfiltration: How One Endpoint Gave Up the Goods

CVSS 9.1Critical

Credential leakage via a Base64 response and an unscoped admin token allowed OTP bypass, enumeration of numeric application IDs, and exfiltration of full loan/PII records. High impact with low effort required.

#Auth Bypass#Credential Leakage#IDOR#Bruteforce#API Misconfiguration

Leaked Creds to Full Data Exfiltration: How One Endpoint Gave Up the Goods

CVSS 9.1Critical

A single leaked Base64 credential chain led to full data exfiltration of loan records via misconfigured APIs and missing auth checks.

#Auth Bypass#Credential Leakage#IDOR#Bruteforce#API Misconfiguration

OAuth Misconfiguration in EdTech App: From Low Privilege to Full Account Takeover

CVSS 8.1High

An OAuth misconfiguration allowed arbitrary identity linking and privilege escalation via unvalidated account association, enabling student-to-instructor takeovers.

#OAuth#Session Misbinding#Federated Identity#Account Takeover#Privilege Escalation

From Remote IDs to Free Rides: Unauthorized Subscription Extensions in [Redacted Student App]

CVSS 9.5Critical

Exploited a predictable remote registration endpoint with no rate limits or identity binding to stack free premium subscriptions — a business logic flaw with direct monetary impact.

#Business Logic Flaw#IDOR#Authorization Bypass#Brute Force#Subscription Fraud

Flipping the Switch: Business Logic Bypass in [Redacted Legal Search Platform]

CVSS 8.0High

A query parameter tweak (`searchMode=PROMODE`) unlocked full premium search functionality with no auth or role checks, revealing a classic backend authorization gap.

#Business Logic#Access Control Bypass#Feature Abuse#Unauthorized Access#Freemium Misuse