Tagged articles
1 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Mar 21, 2023 · Information Security

How to Exploit Horizontal Privilege Escalation: A Step‑by‑Step Guide

This article documents a complete horizontal privilege escalation attack, showing how modifying POST parameters, REST‑style paths, and cookies can lead to unauthorized view, edit, and delete of other users' data, followed by techniques to combine the flaw with XSS and CSRF for greater impact.

CSRFXSScookie manipulation
0 likes · 6 min read
How to Exploit Horizontal Privilege Escalation: A Step‑by‑Step Guide