How I Uncovered High‑Risk Vulnerabilities in an SRC Asset

The author walks through a step‑by‑step vulnerability hunt on an SRC target, starting from a login page, fuzzing JavaScript APIs, exploiting weak passwords and missing authorisation, and ultimately exposing unauthorised video‑camera access and admin privileges.

Black & White Path
Black & White Path
Black & White Path
How I Uncovered High‑Risk Vulnerabilities in an SRC Asset

While exploring a newly added SRC asset, the author began by examining the login page and fuzzing all extracted JavaScript API endpoints for unauthorised access, password reset, SQL injection, credential leakage, username enumeration, and weak passwords. No obvious data leaks appeared at first.

image
image

Assuming that providing a valid userId might retrieve sensitive user data, the author tried several values (e.g., 11111111, 1, admin) without success, prompting a shift to broader asset enumeration across the internet.

image
image

Through lateral movement, the author discovered a system protected only by a weak password. Inside, a long userid string was found, but further requests returned limited information.

image
image

Continuing the hunt, a newly loaded JavaScript file named abcdindex.js leaked numerous route definitions. By parsing accompanying mulu.json files, the author reconstructed base URLs and backend endpoints for multiple subsystems.

image
image

Automated enumeration of these endpoints revealed a generic unauthorised‑access flaw that exposed hundreds of video‑camera control permissions.

image
image

The vulnerability was reported and classified as high‑risk. Recognising that many interfaces still suffered from missing userId checks (type A) or absent authorisation headers (type B), the author demonstrated that stripping the Authorization: Bearer header from requests triggered the same unauthorised responses, effectively bypassing access controls.

image
image

By fuzzing parameters with the collected user IDs, the author successfully retrieved additional data, eventually gaining administrator‑level access across several management modules and uncovering further weak‑password accounts.

image
image

Although the project was closed before all findings could be submitted, the author notes that similar SRC assets are often heavily examined, making straightforward JS‑endpoint extraction less fruitful; however, creative re‑thinking and deeper traversal can still uncover hidden, high‑impact flaws.

Source: Tide Security Team

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

security analysisSRCAPI fuzzinglogic flawunauthorised accessvulnerability huntingweak password
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.