
Sign up to save your podcasts
Or
A predictable ID exposed private documents. A crafted name leaked backend files.
In this episode, we break down two high-impact flawsโan IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.
Chapters:
00:00 - INTRO
01:28 - FINDING #1 โ IDOR to Steal Confidential Files with Just an Attachment ID
09:05 - FINDING #2 โ Server-Side Template Injection That Leaked Local Files
18:41 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
๐ Follow & Connect โ LinkedIn, YouTube, Twitter, Instagram
๐ฉ Submit Your Pentest Findings โ https://forms.gle/7pPwjdaWnGYpQcA6A
๐ง Feedback? Email Us โ [email protected]
๐ Podcast Website โ Website Link
A predictable ID exposed private documents. A crafted name leaked backend files.
In this episode, we break down two high-impact flawsโan IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.
Chapters:
00:00 - INTRO
01:28 - FINDING #1 โ IDOR to Steal Confidential Files with Just an Attachment ID
09:05 - FINDING #2 โ Server-Side Template Injection That Leaked Local Files
18:41 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
๐ Follow & Connect โ LinkedIn, YouTube, Twitter, Instagram
๐ฉ Submit Your Pentest Findings โ https://forms.gle/7pPwjdaWnGYpQcA6A
๐ง Feedback? Email Us โ [email protected]
๐ Podcast Website โ Website Link