Now we have this website.

image.png

Let’s click on the search.

image.png

As showen the photo below we found that this page can be accessed without any authentication.

image.png

Now let’s see it from source code.

image.png

Notice that the $_user_location is set to public which mean that the endpoint can be accessed without the need to be authenticated.

Why Publicly Available Endpoints Are Good Attack Vectors?

Now let’s deep dive in the application.

Now let’s Discover all the pages that are avilable without any authentication.

image.png

now let’s extract the php files names and.

grep -rnw /opt/lampp/htdocs/ATutor -e "^.*user_location.*public.*" --color

image.png

as we see we got all the endpoints that are public available.