Farhan Abbas shares an intriguing XSS bug recently discovered on a site lacking a bug bounty
program.
Bug Bounty Tips: Master Networking for Better Hacking
Discover essential bug bounty tips in simple language, emphasizing networking mastery for more accurate hacking. Learn about IPv4, IPv6, OSI Model, and subnetting in an easy-to-understand format. Elevate your bug bounty skills today.
Bug Bounty Tips: API Documentation Bugs for Administrator Panel Takeovers
Bug Bounty Tips: API Documentation Bugs for Administrator Panel Takeovers
In this bug bounty journey, RootBakar has unearthed a significant vulnerability on an Indonesian website. Without further delay, let’s delve into the intricacies of the bug, its repercussions, and the serendipity that led to its discovery.
Bug Discovery:
During this exploration, RootBakar identified a vulnerability enabling a malicious user to acquire valid credentials disclosed through the API Documentation.
Typically, API Documentation imparts knowledge to users solely on how to send requests to specific endpoints. However, in this distinctive scenario, RootBakar discovered that the API Documentation included usernames and passwords. Using these credentials granted access to the website, ultimately resulting in the takeover of the website with the authority of an administrator.
Impact:
Administrator Panel Takeover
Proof of concept:
- Navigate to the API Documentation link on the website.
- Conduct a keyword search in the API Documentation, such as username or password.
- Multiple usernames and passwords are discernible in the API Documentation.
- Notably, the username [email protected] and password redacted are among them.
- Log in to the website using these credentials.
- Successfully log in and gain access as an administrator.
Notes:
- The provided credentials carry the role of an administrator.
- Always scrutinize usernames and passwords provided in API Documentation.
This comprehensive account encapsulates the essence of RootBakar’s findings. May this disclosure prove invaluable and serve as inspiration for fellow bug hunters. Constructive critiques and feedback from the bug hunting community are eagerly welcomed.
Bug Bounty Tips: Uncovering Mass Account Takeover via Broken Access Control
Bug bounty tip by Vinay Sati. Vinay explores exploiting Broken Access Control (BAC). Read bug bounty tips by BugBounter to maximize your skills.
Mastering the Art of Bug Bounty: Strategies from Seasoned Researchers
Master the art of bug bounty for career advancement in cybersecurity. Explore strategies from seasoned researchers, leverage bug bounty platforms, and join Bugbounter for exciting opportunities.
Bug Bounty Tips: Business Logic and Bounty Point of View
Mustafa shares bug bounty tip on logic errors, integration points, and dynamic systems in this week’s tip. Read bug bounty tips, and uncover the success!
Bug Bounty Tips: The Programming Foundation of Bug Bounty
Learn the connection between coding and ethical hacking. Enhance your bug bounty skills. Read bug bounty tips by BugBounter today.
Bug Bounty Tips: Harnessing the Power of AI in Bug Bounty
Boost your cybersecurity researches by harnessing the power of AI today. More bug bounty tips like this one are on BugBounter.com!
Bug Bounty Tip: CWE-798 – The Hard Coded Credentials Vulnerability
Alican shares his bug bounty tip on identifying and reporting CWE-798, AKA Hard Coded Credentials Vulnerability. Read to learn more.
Bug Bounty Tip: Utilizing JSON and Lists for ATO Testing
Bug Bounty Tip: Utilizing JSON and Lists for ATO Testing
The bug bounty tip of this week comes from Mohamed Reda.
When testing a login functionality during a bug bounty program, utilizing JSON and lists can help uncover potential Account Takeover (ATO) vulnerabilities. This technique involves manipulating the request payload to test the system’s response to list-type inputs.
Procedure
1. Modify Request Body
Change the request body to JSON format and structure it to accept lists for the email and password fields.
From:
{
"email": "email",
"password": "password"
}
To:
{
"email": [
"email1",
"email2"
],
"password": [
"password1",
"password2"
]
}
2. Test for ATO Vulnerabilities
a. Single Password Test
- Utilize a list of emails and try a single password across all emails. Verify if any email-password combination allows successful login.
b. Brute Force Test
- Use a list of emails and a list of passwords.
- Employ an Intruder tool to systematically perform a brute force attack.
- Check for successful logins using different email and password combinations.
Please Note
Always conduct security testing within the scope of the bug bounty program and with explicit authorization. Respect ethical guidelines and adhere to responsible disclosure practices when identifying and reporting vulnerabilities.
This approach helps uncover potential vulnerabilities in the login process, ensuring a thorough security assessment and contributing to a more secure system.
Get Popular with BugBounter!
Get featured on BugBounter with your bug bounty tip. Sign up on BugBounter as a cybersecurity researcher today, and contact our Community Manager Salih with your username on BugBounter via their email, [email protected].