IDOR allows attackers to access files through user-supplied inputs without proper authorization, enabling brute force attacks on predictable URL patterns to access private or protected files.
File URLs follow a fixed pattern, allowing access to sensitive files.
No authentication or authorization required, granting access to anyone with the link.
Server responses are checked to find files for download or scraping.
Data is scraped and saved, bypassing user interaction with JavaScript injection.
The target system responded differently to valid and invalid file URLs. By iterating over possible file URLs and checking the server’s HTTP status code, it was possible to determine which files were actively hosted on the server based on non-404 responses.
Once a valid file URL was identified, the file page could be scraped using BeautifulSoup to extract the file's actual name. This made it possible to enumerate and identify uploaded files without authentication or user interaction.