How I Uncovered Multiple Vulnerabilities in My Alma Mater’s Campus App

The article details an authorized penetration test of a university campus app, revealing sensitive data leakage, horizontal and vertical privilege escalation, face‑photo tampering, and a stored XSS flaw, each demonstrated step‑by‑step with packet captures and screenshots.

Black & White Path
Black & White Path
Black & White Path
How I Uncovered Multiple Vulnerabilities in My Alma Mater’s Campus App

After receiving permission from the university, the author joined a campus‑network penetration test and focused on the school‑provided mobile app. Initial information gathering led to intercepting the app’s HTTP traffic after refreshing the home page.

Sensitive information leakage : By capturing the request that returns the home page, the author enumerated userId values. Traversing these IDs exposed roughly 19,000 records containing student numbers, majors, dormitory assignments, and facial images, which could be used for further attacks.

Sensitive data capture
Sensitive data capture

Horizontal privilege escalation : Testing showed that IDs 1‑14590 belong to students and 14590‑15000 to teachers. By modifying the userId in the intercepted request, the tester could view any other user’s complete profile, including travel records, facial data, dormitory numbers, class, and name.

User ID modification
User ID modification

Vertical privilege escalation : Using the previously obtained admin‑level credentials, the author changed the persontype field and accessed a hidden attendance‑rescheduling interface. This revealed additional system functions that were not intended for regular users.

Attendance reschedule interface
Attendance reschedule interface

Face‑photo tampering : The author captured a login request, replaced the Authorization header, altered the userId to that of another account, and submitted a new base64‑encoded image. After sending the modified packet, the target account’s profile picture changed successfully.

Modified face photo
Modified face photo

Stored XSS : While exploring the attendance‑reschedule feature, the tester discovered a file‑upload endpoint. By uploading an SVG file whose filename ends with .svg and embedding malicious script code, the attacker obtained a URL containing a token. Accessing this URL via the web portal executed the script, confirming a stored XSS vulnerability.

Stored XSS proof
Stored XSS proof

All identified vulnerabilities were reported and patched before the article was published.

privilege escalationPenetration Testingmobile app securitystored XSSvulnerability disclosureinformation leakage
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.