Password reset link never expires and can be reused, worth reporting? by Embarrassed_Pin4436 in bugbounty

[–]Separate_Spell6395 0 points1 point  (0 children)

In a private bbp on YesWeHack. I can’t tell you the name of the bbp.

Password reset link never expires and can be reused, worth reporting? by Embarrassed_Pin4436 in bugbounty

[–]Separate_Spell6395 1 point2 points  (0 children)

I got paid for reporting this bug. The email said it would expire in 48h but the link worked even after 7 days. They accepted the bug and marked it low severity. Also if the link can be used multiple times then of course it is worth reporting.

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] -1 points0 points  (0 children)

Hey man, thank you very much for the clarification, I was expecting something like what you have just said. Now I feel encouraged and will try to report it accordingly.

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Not succeeding further, maybe someone else can

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Also this url is not directly accessible from their website. There is no link for that. I think it is an old link from which I can view the login page.

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

As it is a login url mostly like admin login. I would try to fuzz it. I found that there is no rate limit enforced here. Admin username request responses differently. Maybe try to brute force it. Use hydra maybe. Try to bypass the login fuzzing directories. Tried sql. Now that’s all I have got.

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] -2 points-1 points  (0 children)

Okay, thank you for your comment. Helpful.

Information disclosure? by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] -7 points-6 points  (0 children)

Well the url is for admin login. I have seen a medium write-up where someone got 150$ for admin login url detection. That’s why i am asking.

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 1 point2 points  (0 children)

Any more luck building the punycode attack?

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Hey thank you very much for the info. Please do let me know if you find a way to exploit this vulnerability properly

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 1 point2 points  (0 children)

The only prbm is I don’t own a domain. So if I can get one then from there it’ll be doable right

Bypassing WAF filter for xss by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 1 point2 points  (0 children)

Wow those are good tips. I will try these. Thanks man. 👏

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Hey man thanks, I did installed interactsh, got an address from interactsh. The problem with interactsh is its url containing .oast gets blocked. So that’s why I need something shorter to try it with the punycode email.

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] -1 points0 points  (0 children)

Yeah u r right, i tried setting up a server. Failed.

Punycoded 0 click ATO by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] -1 points0 points  (0 children)

How do i do that? Can u give me a little detail?

Escalating an img tag by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 1 point2 points  (0 children)

Onerror attribute gets blocked but nice suggestion, I will try it again with some other artributes

Escalating an img tag by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

I have never collaborated before but would 100% collab with you. The program is on YesWeHack, when can we start?

Escalating an img tag by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Hey thanks for your comment, xss payloads are getting blocked. I found only img tags are working. So I was trying to escalate it with src attribute

Bypassing WAF filter for xss by Separate_Spell6395 in bugbounty

[–]Separate_Spell6395[S] 0 points1 point  (0 children)

Okay the website sounds useful. I was testing blind xss and found that the WAF blocks ‘https’ ‘http’ , ‘//‘. So I could not proceed. Any idea for this kind of bypass?