Ever thought how you are implementing and passing data from the form to your queries? You are doing it dynamically?
Summary: In this writeup, I will explain how I was able to change the user account password without providing the old password. This writeup will be short. I will not take much time.
About Target: Target was From a private program. So, let’s assume the target is site.com
Now, you will see a form which allows you to edit your account details and there is also another option to change your current password which requires your old password but this can be bypassed easily.
Now, for bypassing this change password feature. Just edit your account details and then submit this request and meanwhile intercept it.
Now you will notice some $_POST fields which will be like
user[first_name] // For changing first name user[last_name] // For changing last name
This post request is making an array of the user which is having some key values (first_name,last_name). That means it is making a dynamic SQL query at the backend.
For changing the password just add a new key here user[password] and pass your value.
Write-Up By Anil Tom It was another ordinary day that I came home from office and was chatting with my roommates, when one of my friends called up and told he wanted to buy a new laptop and needed some suggestions. So I went online and began hunting for laptops that met his requirements. I was reading about one of the Asus RoG models, when suddenly the Bug Hunter in me woke up and I asked myself why I shouldn’t Recon the Asus website. So I began my recon of the website, and spent a whole night looking for a bug on their main domain and did not find anything… The next day morning I went to my office, but my mind was still on the Asus bug hunt. That evening I got a notification on my mobile that there was an update for the Termux app. And suddenly my Bug Hunter senses tingled, and I thought, “Why don’t you run a sublister against asus.com on the mobile?” I randomly selected one of Asus’ sub-domains, specifically http://stw.asu...
Hello readers, This is Prial Islam a security researcher from Bangladesh . This is a old finding of mine adding into my blog . Today I will write about a Critical IDOR vulnerability that will lead to Information Disclosure what allowed me to get any Vine user’s sensitive information including Ip address/phone no/email . I reported this bug to Twitter Security team in their Bug Bounty Program in Hackerone and they Rewarded me with a amount of 7560$ for this report . $$$$ + Blog post permission 😾 😇 Vine has issued a statement regarding this vulnerability on their Vine blog Post here and also Hackerone mentioned this vulnerability in hackerone Zerodaily Newslatter . Vulnerable Endpoint :- https://vine.co/api/users/profiles/<User Id> When I was testing vine domains for something interesting . I noticed the Endpoint what response wa...
Writeup By Sudhanshu Rajbhar Heyy Everyonee, In this writeup I am going to tell you how I was able to get xss in Zomato. I will tell the whole story how I found the vulnerable parameter. Actually at that time I was reading a book “Mastering Modern Web Penetration Testing” (You can get it on Amazon) and from there I got know about a website named wolframalpha which we can use for subdomain enumeration. I just thought of giving it a try , so I enetered zomato.com in the search bar and it gave me around 10 subdomains.It also shows “daily visitors” of a particular subdomain, thats a great options if you are looking for a less visited areas.So the last domain from the list caught my attention as the visitors were very less compared to others. Source: https://www.wolframalpha.com/input/?i=zomato.com I opened secretx.zomato.com, and all I can see is a button -“sign in with Zomato”.I checked the source code , nothing ineteresting. I clicke...
Comments
Post a Comment