Web Security Academy

Access control - Lab : URL-based access control can be circumvented