In November 2020, the firm Silent Breach identified an IDOR vulnerability with the United States Department of Defense web site and privately reported it via the DOD's Vulnerability Disclosure Program. The bug was fixed by adding a user session mechanism to the account system, which would require authenticating on the site first.5
It was reported that the Parler social networking service used sequential post IDs, and that this had enabled the scraping of terabytes of data from the service in January 2021. The researcher responsible for the project has said this was inaccurate.67
"Insecure direct object references (IDOR) | Web Security Academy". portswigger.net. Retrieved 2021-01-12. https://portswigger.net/web-security/access-control/idor ↩
Karande, Chetan. "Securing Node Applications - 4. Insecure Direct Object References". www.oreilly.com. Retrieved 2021-01-12. https://www.oreilly.com/library/view/securing-node-applications/9781491982426/ch04.html ↩
Solomon, Howard (2021-01-12). "Common development error likely led to huge Parler data theft, says expert | IT World Canada News". www.itworldcanada.com. Retrieved 2021-01-12.[permanent dead link] https://www.itworldcanada.com/article/common-development-error-likely-led-to-huge-parler-data-theft-says-expert/440646,%20https://www.itworldcanada.com/article/common-development-error-likely-led-to-huge-parler-data-theft-says-expert/440646 ↩
Contieri, Maximiliano (2025-05-17). "Refactoring 028 - Replace Consecutive IDs with Dark Keys". Clean Code Cookbook. Retrieved 2025-05-17. https://maxicontieri.substack.com/p/refactoring-028-replace-consecutive ↩
Cimpanu, Catalin. "Bug hunter wins 'Researcher of the Month' award for DOD account takeover bug". ZDNet. Retrieved 2021-01-12. https://www.zdnet.com/article/bug-hunter-wins-researcher-of-the-month-award-for-dod-account-takeover-bug/ ↩
Greenberg, Andy (January 12, 2021). "An Absurdly Basic Bug Let Anyone Grab All of Parler's Data". Wired. Archived from the original on January 12, 2021. Retrieved January 12, 2021. https://www.wired.com/story/parler-hack-data-public-posts-images-video/ ↩
@donk_enby (January 30, 2021). "also a lot of the news coverage claimed the post IDs were sequential. they were not, but: https://github.com/d0nk/parler-tricks/blob/main/parler/conversion.py#L22 (this endpoint only existed in their iOS app and afaik wasn't actually used for anything)" (Tweet). Archived from the original on January 30, 2021. Retrieved February 12, 2021 – via Twitter. https://x.com/donk_enby/status/1355640041155031040 ↩