In the following screenshot, you have a vulnerable application and you have intercepted the next request:
We have their parameters in this request; login, action, and secret. The vulnerable parameter here is login. The secret variable is the data assigned by the user during their registration; the vulnerability that exists is that if the malicious user modifies the login parameter, the application changes the secret value for the user specified without validation. So, we have created another user called vendetta2, to try to modify the secret value pertaining to this individual, as demonstrated in the following ...