How an IDOR Vulnerability Led to User Profile Modification
https://www.hackerone.com/vulnerability-management/idor-vulnerability-deep-dive
https://www.hackerone.com/vulnerability-management/idor-vulnerability-deep-dive