Welcome to SecOne4All

Your destination for hacking tutorials, tools, and threat analysis.

How I discovered critical price manipulation

Mubarak.Mr_Tester999
Security Research / Tutorials

Hello Brothers,

  1. First, I switched to the Annual Plan, Monthly Payment plan. I noticed that the coupon_id appears in the URL, as shown below.

After that, I switched back to the Annual Plan, Pay upfront plan and Fill all fields and clicked on next.

Then I added the Coupon_id parameter to the URL. I noticed that we can apply 30% off on this plan. By default, this plan allows only 20% off, but using this way I was able to apply 30% off, leading to more significant loss for the company.

Note: When I tried to use the Coupon_id parameter on an unauthorized plan, this didn’t work. But many times I noticed that we can use it on an unauthorized plan if we enter payment details and click on next , then append the Coupon_id to the URL. Otherwise, the PoC doesn’t work.

This is the response from the customer.

Unfortunately This reward is one of many rewards that I was not able to receive, due to my payment profile and my Bugcrowd account being blocked because of unintentionally breaking the payment policy.

Thank you, brothers. I hope this was useful for you. 👍

Leave a Reply

Your email address will not be published. Required fields are marked *