Scope: Python Test Automation & High-Impact Security Vulnerability Discovery

Summary: I was initially brought in by DormMom to build comprehensive Selenium-based test units for their CI/CD pipeline. This testing suite focused on validating role-specific functionality across multiple user types, including end users, managers, and franchise owners.

My relationship with the client expanded after I proactively identified and reported a critical bug during testing—leading to a formal security testing engagement that uncovered multiple high-severity vulnerabilities.


Tasks:


Actions:
Through manual security testing and code behavior analysis, I uncovered two Broken Access Control vulnerabilities (IDOR) with significant impact:

  1. Full Account Takeover via Hidden Input Tampering
    • A hidden form field containing the user ID could be manipulated to modify the email of any account.
    • This allowed an attacker to trigger a password reset and gain full access to victim accounts.
    • OWASP Category: Broken Access Control → Insecure Direct Object Reference (IDOR)
  2. Lateral User Data Manipulation via ID-based Input/OnClick Handlers
    • Multiple frontend features improperly exposed database user IDs via onclick handlers and input value fields.
    • This allowed users to update or overwrite data associated with other users of similar privilege (agents, clients).
    • Affected features included phone number updates, special instructions, and widget configuration.

Results:

This engagement showcases my ability to move fluidly between automated QA, security testing, and secure coding consultation—delivering tangible value and trust across the software development lifecycle.

Leave a Reply