Skip to content

Bug Report Misconfigured Role-Based Access for Project Registration Service in my University's ERP Portal

Updated: at 03:23 PMSuggest Changes

Finding a Security Bug in My University’s ERP Portal

As a student interested in cybersecurity, I recently discovered a concerning vulnerability in my university’s VTOP portal that handles summer internship project registrations. Here’s what I found and how I responsibly disclosed it.

The Issue

While using the portal, I noticed that the role-based access controls weren’t properly implemented. This meant I could potentially access other students’ internship project details - something that should definitely be private!

Technical Details

The vulnerability existed in this API endpoint:

POST /vtop/summer/ViewStudentRegistrationDetailsPage HTTP/1.1
Host: vtop.vitap.ac.in

This falls under OWASP’s A01:2021-Broken Access Control category.

How I Found It

Using Burp Suite as my proxy tool, I was able to:

  1. Intercept the API requests
  2. Identify the project ID parameter
  3. Test different project IDs using Burp Suite’s Intruder

Here’s what that looked like:

Added the payload dictionary in the Burp Suite Intruder.

Bruteforcing for API content retrieval of project data, resulting in a misconfigured data leak.

Demo: YouTube Video

Misconfigured RBAC (Role-Based Access) Behavior:

After intercepting the ViewStudentRegistrationDetailsPage sub API route, changing/replacing it with another existing project ID from the intercepted API body.

Gained access to files and edit access to others’ forms.

Expected Behavior:

My registration form content, for example: