Hintru ENES ← Todos los labs

Ottergram (BAC + HTTP Verb Tampering) — Bugforge

EN medium CTF challenge BACBroken Access ControlHTTP Verb TamperingIDORAuthorization BypassBurp Suite

Ottergram is a social-media-style web application on Bugforge.io where users browse otter photos. The attack chain is two-stage: first, find functionality you shouldn't be able to reach. Then, find a way past the gate that's supposed to stop you.

0/5
resueltos
👁 Paso 1 Paso 2 Paso 3 Paso 4 Paso 5
post_exploitation

Paso 5 · Exploit Admin Access — Perform Unauthorised Admin Action

Objetivo: Use the verb-tampered request to perform an admin-level action — such as reading other users' data, deleting posts, or modifying user roles — to demonstrate the full impact of the BAC + Verb Tampering chain.

Contexto: You now have a working bypass: a specific HTTP verb on the admin endpoint returns 200 as a regular user. Demonstrate the real-world impact by performing an action only an admin should be allowed to do.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

What admin actions can you now trigger? Try reading sensitive user data, modifying another user's content, or escalating privileges — all using the verb-tampered request as your template in Burp Repeater.

Pista 2 — técnica / clase de vuln

Replay the successful verb-tampered request but adjust the endpoint path or body to target admin actions: listing all users, viewing private posts, or performing moderation tasks.

Pista 3 — casi la solución

Use the bypass method (the working HTTP verb) to navigate admin sub-endpoints. For example, if /api/admin/users returned 200, try fetching individual user data, accessing post moderation, or reading private content that is not visible in the normal user feed.

Tu intento