FOLLOW FLUID ATTACKS
The system’s authorization mechanism does not prevent one user from accessing another user’s data by modifying the key value that identifies it.
R176. Restrict system objects
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.