←back to thread

122 points waldopat | 1 comments | | HN request time: 0s | source
Show context
toddmorey ◴[] No.44738229[source]
"The vulnerability we discovered was remarkably simple to exploit - by providing only a non-secret app_id value to undocumented registration and email verification endpoints." So you could sign yourself up as editor / collaborator on any app once you knew the app's ID.

Jeez, that's sloppy. My colleague in 2000 discovered you could browse any account on his bank's website by just changing the (sequential!) account IDs in the URL. In a lot of ways we've made great strides in security over the last 25 years... and in many ways, we haven't.

replies(4): >>44738468 #>>44738495 #>>44739179 #>>44743468 #
roozbeh18 ◴[] No.44739179[source]
20 years ago the school class enrollment website allowed just that by changing account IDs in URL, we were bypassing the priority enrollment. I had fun adding my friends and I to classes we wanted.
replies(3): >>44739364 #>>44740701 #>>44741509 #
1. cwmoore ◴[] No.44741509[source]
That’s useful. But 30 years ago you could iterate Social Security Numbers.