Information Disclosure vulnerability | p1 bug
Hi There,
Hacking Aspirants, I am Regan Temudo
I hope you all are fine, In this blog I will be explaining the bug which leak the sensitive information. Let us call the program as example.com. one of them was that a person can give gifts to the another person. As I was testing this feature, I gave a gift to the a random person and after presenting gift I was redirected to final page. That was normal flow of the application.
But then I noticed the URL which was something like that “[https://example.com/gift-sent/?id=](https://example.com/gift-sent/id=)NzYwNDU%3D”
Id parameter
The id parameter was quite interesting to me. I understood the whole flow of application and got to know that the this was my id which was assigned to me after giving gift.
The id parameter was quite interesting to me. I understood the whole flow of application and got to know that the this was my id which was assigned to me after giving gift.
Decoding Id parameter value
The Id was something like that NzYwNDU%3D. To decode that i first URL decoded the string. After that the id was like this “NzYwNDU=” which is base64 encode. Then I quickly base64 decoded this string which gave me a plain id “76045”.I changed the value of ID parameter “76045” to “76044” and BOOM!! the request was successful. I was able to see the name of person to whom someone gave a gift. That was kinda low impact bug. I don’t gave up. I looked at the source code and to my surprise I was able to see the sensitive information of any person who presented a gift to any person. Sensitive information included email, bank details, first name , last name. That was quite interesting.
Decoding Id parameter value
Python Exploit
A Small Script Which Will Help You To Automating Your Task. The Script Looks Something Like This
Thanks!...
Comments
Post a Comment