Known Vulnerabilities in Folder-based Authorization Strategy