{"version":"1.0","image_url":null,"description":"Hello there, ('\u03c9')\u30ce \ud83c\udfaf 1. \u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u8106\u5f31\u6027\u3068\u306f\uff1f \u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u8106\u5f31\u6027\u3068\u306f\u3001\u672c\u6765\u30a2\u30af\u30bb\u30b9\u3067\u304d\u306a\u3044\u306f\u305a\u306e\u30ea\u30bd\u30fc\u30b9\u3084\u64cd\u4f5c\u304c\u3001\u30e6\u30fc\u30b6\u306e\u7acb\u5834\uff08\u4f8b\uff1a\u4e00\u822c\u30e6\u30fc\u30b6\u3001\u7ba1\u7406\u8005\u306a\u3069\uff09\u306b\u95a2\u4fc2\u306a\u304f\u884c\u3048\u3066\u3057\u307e\u3046\u554f\u984c\u3067\u3059\u3002 \ud83d\udd13 \u4f8b\uff1a \u4e00\u822c\u30e6\u30fc\u30b6\u304c \u7ba1\u7406\u8005\u30da\u30fc\u30b8\u306b\u30a2\u30af\u30bb\u30b9 \u3067\u304d\u308b \u30e6\u30fc\u30b6A\u304c \u30e6\u30fc\u30b6B\u306e\u60c5\u5831\u3092\u53d6\u5f97\u30fb\u66f4\u65b0 \u3067\u304d\u308b \u30ed\u30b0\u30a4\u30f3\u3057\u3066\u3044\u306a\u3044\u72b6\u614b\u3067 \u4fdd\u8b77\u3055\u308c\u305f\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9 \u3067\u304d\u308b \ud83e\udded 2. \u30c1\u30a7\u30c3\u30af\u3059\u3079\u304d\u30da\u30fc\u30b8\u30fb\u6a5f\u80fd\u4e00\u89a7 \u7a2e\u5225 \u30da\u30fc\u30b8\u30fb\u6a5f\u80fd\u306e\u4f8b \u5099\u8003 \ud83d\udc64 \u30d7\u30ed\u30d5\u30a3\u30fc\u30eb\u7de8\u96c6 /user/edit?id=123 \u306a\u3069 \u4ed6\u30e6\u30fc\u30b6\u306eID\u306b\u66f8\u304d\u63db\u3048\u3066\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u304b \ud83d\udcc1 \u7ba1\u7406\u753b\u9762 /admin/,\u2026","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","provider_url":"https://hatena.blog","title":"\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u8106\u5f31\u6027\u8a3a\u65ad\u30de\u30cb\u30e5\u30a2\u30eb\uff08Access Control Vulnerabilities\uff09","blog_url":"https://cysec148.hatenablog.com/","provider_name":"Hatena Blog","type":"rich","height":"190","width":"100%","categories":["Web Security Academy","\u8a3a\u65ad\u30de\u30cb\u30e5\u30a2\u30eb"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F06%2F05%2F184232\" title=\"\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u8106\u5f31\u6027\u8a3a\u65ad\u30de\u30cb\u30e5\u30a2\u30eb\uff08Access Control Vulnerabilities\uff09 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2025-06-05 18:42:32","author_name":"ThisIsOne","url":"https://cysec148.hatenablog.com/entry/2025/06/05/184232","blog_title":"Shikata Ga Nai"}