Menu Icon

Cobalt Vulnerability Wiki

Cobalt Vulnerability Wiki


Toggle Arrow IconV2 - AuthenticationToggle Arrow IconV3 - Session ManagementToggle Arrow IconV4 - Access ControlToggle Arrow IconV5 - Validation/SanitizationToggle Arrow IconV6 - CryptographyToggle Arrow IconV7 - Error LoggingToggle Arrow IconV8 - Data ProtectionToggle Arrow IconV9 - CommunicationsToggle Arrow IconV10 - Malicious CodeToggle Arrow IconV11 - Business Logic
DoS - App Crash File Upload - No Size Limit Horizontal Privilege Escalation Negative Bank Transaction No Antivirus - EICAR file Upload Unrestricted File Upload - File Extension Filter Bypass Vertical Privilege Escalation
Toggle Arrow IconV12 - Files ResourcesToggle Arrow IconV13 - APIToggle Arrow IconV14 - Config
Arrow Left

V11 - Business Logic

Horizontal Privilege Escalation


- Login as UserA

- Using the IDOR vulnerability found, impersonate to User B who has the same privileges as UserA

Note: Since this is a business logic vulnerability, the PoC is generalized





Ready to get started?

our platformschedule a demo
Aircall logoAlgolia logoCangageCredit KarmaDattoEgnyteHubspotMovinimageMulesoftPendoSentaraSmarshSnowSolarisTalkdeskVerifoneKubraAxel SpringerNuna

Join some of these great clients we're proud to have helped