Unauthenticated IDOR in Employee Login Exposes PII to more than 100K Users

3 min readMay 25, 2024


بِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ

Hi geeks,

A few weeks ago, I worked on a Private BBP on the HackerOne platform. I usually start my testing with passive and active recon to discover subdomains and learn more about the target. Following this, I’m trying to get subs doesn’t fame with other hackers.

First, I try to find subs that passive recon tools couldn’t detect by using my lovely active recon ways :))

Here we go, I’ve found a new subdomain: example2.example.com

It’s an Employee login for the company

Okay, let’s start our magic now :)

Easy HTMLi in the mail

First, within just a few minutes, we discovered an endpoint for “request user” page that triggers when an employee forgets their password or has login issues. This endpoint sends an email to both the administrator and the employee who sent. From this form, we got an easy HTMLi in the email :)

Searching for a big chicken

We started on the subdomain and found an easy HTML injection in just minutes. But I think we have a big chicken here with high impact :)

So I started reviewing source code and analyzing js files (the missing treasure).

I found a juicy endpoint “/user_management.edit_user_new?p_inst_id=316569953&p_usr_id=-1”

After opened it I found that give me a nice error that I should have a necessary cookies for that

So now I tried to open the endpoint with the default cookies in the login page or redirected from it.

LOL, that’s another hidden endpoint for “request user” page but now the endpoint have an interested parameters we can play with it :)

After changing the value of “p_user_id” parameter to positive number such as “p_user_id=1” , I found PII Dislosure to all users (Employees & customers) more than 100K users

If you’ve made it this far, I hope you found this write-up helpful. My apologies if there were any issues along the way…HAVE A NICE DAY!




Penetration Tester & Bug Hunter || Whether you think you can or you think you can't, you're right.