Known Vulnerabilities in Folder-based Authorization Strategy 1.2