BugForge - Daily - Sokudo (Repeat)
BugForge - Daily - Sokudo (Repeat)
Daily - Sokudo (Repeat)
This is a repeat of the daily challenge from January 1st, 2026.
Vulnerability Overview
This challenge demonstrates a Broken Access Control vulnerability through HTTP Verb Tampering in the Sokudo typing application’s statistics endpoint. The application allows users to complete typing tests and track their performance statistics.
Key Issues:
- The
/api/statsendpoint implements access restrictions for POST but not for PUT - No consistent authorization checks are applied across all HTTP methods
- Attackers can bypass access controls by simply changing the HTTP verb
- The server trusts the HTTP method context without enforcing uniform authorization logic
This represents a classic HTTP Verb Tampering vulnerability where inconsistent security enforcement enables unauthorized modification of resources.
Vulnerabilities Covered
- Broken Access Control - Exploitation of HTTP verb tampering to bypass authorization and manipulate statistics
Classification
- OWASP Top 10: A01:2021 - Broken Access Control
- CWE: CWE-650 - Trusting HTTP Permission Methods on the Server Side
This post is licensed under CC BY 4.0 by the author.
