{"id":20493925,"url":"https://github.com/qeeqbox/authorization-bypass","last_synced_at":"2026-03-19T16:04:52.823Z","repository":{"id":104218776,"uuid":"485632441","full_name":"qeeqbox/authorization-bypass","owner":"qeeqbox","description":"A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier","archived":false,"fork":false,"pushed_at":"2024-01-29T01:08:03.000Z","size":135,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-05T17:51:54.244Z","etag":null,"topics":["authorization","bypass","example","infosecsimplified","metadata","qeeqbox","vulnerability"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"agpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/qeeqbox.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-04-26T04:25:40.000Z","updated_at":"2023-06-20T18:58:35.000Z","dependencies_parsed_at":"2024-01-29T02:38:40.160Z","dependency_job_id":"4d88aab5-56b7-431d-afd0-95b885f46f83","html_url":"https://github.com/qeeqbox/authorization-bypass","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/qeeqbox/authorization-bypass","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthorization-bypass","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthorization-bypass/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthorization-bypass/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthorization-bypass/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/qeeqbox","download_url":"https://codeload.github.com/qeeqbox/authorization-bypass/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthorization-bypass/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30279777,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-08T20:45:49.896Z","status":"ssl_error","status_checked_at":"2026-03-08T20:45:49.525Z","response_time":56,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["authorization","bypass","example","infosecsimplified","metadata","qeeqbox","vulnerability"],"created_at":"2024-11-15T17:37:34.925Z","updated_at":"2026-03-09T01:31:34.908Z","avatar_url":"https://github.com/qeeqbox.png","language":null,"readme":"\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authorization-bypass/main/authorization-bypass.png\"\u003e\u003c/p\u003e\n\nA threat actor may perform unauthorized functions by bypassing or abusing the target authorization mechanism\n\n## Example #1\n1. Developer forgets to remove an in-house debugging mechanism associated with user-agent\n2. A threat actor finds out changing the user-agent header to debug grants different or higher privileges\n\n## Impact\nVary\n\n## Risk\n- read \u0026 modify data\n- execute commands\n\n## Redemption\n- validate access control\n\n## ID\n91f9b046-b802-425a-b71b-64c21c6b1c0f\n\n## References\n- [mitre](https://cwe.mitre.org/data/definitions/639.html\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fauthorization-bypass","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fqeeqbox%2Fauthorization-bypass","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fauthorization-bypass/lists"}