FIA Driver Categorisation Admin Takeover via Mass Assignment... #1515
+176
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Context. The FIA Driver Categorisation portal lets competitors self-register and request Bronze/Silver/Gold/Platinum status at
drivercategorisation.fia.com. While testing the profile update flow, the researchers found a classic mass assignment / broken access control that let any authenticated user assign themselves theADMINrole via the profile update API hosted atdriverscategorisation.fia.com. This is a vertical privilege escalation ...🔧 Technical Details
Mass assignment role escalation. If a user-profile update endpoint reflects privileged fields (e.g.,
roles) and does not enforce server-side allow‑listing, include a craftedrolesarray in the same PUT/PATCH to your own user resource to escalate privileges (e.g., setnametoADMINand a validid/description). Expect success if the response echoes the updated role; then reauthenticate to obtain an admin-context session.Schema discovery from client bundles. Inspect bundled JavaScript to enumerate valid role names/IDs and payload shapes. Use these to build syntactically valid JSON that passes server deserialization and persistence checks.
Session refresh to realize new privileges. After mutating role-bearing attributes, perform a logout/login (or token refresh) so the app re-issues tokens/claims and renders admin-only UI and endpoints.<...
🤖 Agent Actions
I analyzed the blog and repository, searched for existing coverage, and updated HackTricks with a dedicated Mass Assignment page plus relevant cross-links.
Summary of analysis
What I added
Files changed
Notes
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.