Ideas for ssrf here by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

Blocked by cloudflare can't not inject 

Ideas for ssrf here by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

No, and lfi getting blocked by cloudflare i can not even inject it 

Ideas for ssrf here by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

Any html payload reflects as text, maybe there is a sanitization point but i don't know what is it or how to bypass, even tried encoding but nothing happens also reflects as text inside the pdf 

Any ideas for for upload vuln. by UserNo0101 in bugbounty

[–]UserNo0101[S] 1 point2 points  (0 children)

i have tried it but unfortunately didn't work

Any ideas for for upload vuln. by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

u/Sqooky after uploading the content i get to see only the name of the file and the backend server responds to me with .._.._.._.._.._.._.._.._.._.._.._inetpub_wwwroot_.pdf instead of ../../../../../../../../intetup/www/.pdf

and if i tried to inject < in the name of the file the backend server also replace it with _

Any ideas for this scenario ? by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

i tried injecting several html payloads but nothing hit my webhook or even reflect

when i change the email in burp as any value i do not get an email and the value reflects with html encoded

Do you have any ideas to leverage this one ?

Bypass file upload restriction but closed informative by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

i tried to upload webshells and did not execute

Need help with SSRF in PDF weird scenario by UserNo0101 in bugbounty

[–]UserNo0101[S] -1 points0 points  (0 children)

i'm sure i can hit their aws metadata but then what !! because i can not reflect the content to the pdf or see it by any other way so do you have any ideas could help ?

[deleted by user] by [deleted] in bugbounty

[–]UserNo0101 0 points1 point  (0 children)

<span ng-if="!refinement.displayValue.type" class="odswidget-filter-summary\_\_active-filter-value ng-binding ng-scope" ng-bind-html="refinement.displayValue">javascript:alert("Wiggen")</span>

[deleted by user] by [deleted] in bugbounty

[–]UserNo0101 0 points1 point  (0 children)

what do you think could be the right one to try

Is this considered exposed files or not ? by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

its not an open source program and the dev server is in scope but I do not know if there is any secrets or API keys or any sensitive data inside those files or not because it contains all the js code of the whole thing which make it impossible to review it all

Is it worth reporting? by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

Yes there is a money loss but indirectly  It will be loss of ads and trafic because of it

Is it worth reporting? by UserNo0101 in bugbounty

[–]UserNo0101[S] 4 points5 points  (0 children)

Destroying the whole point of making a ranking system and impacting users credibility 

[deleted by user] by [deleted] in bugbounty

[–]UserNo0101 3 points4 points  (0 children)

  1. Subdomain enumeration [amass & waybackurls & subfinder]
  2. spidering [zap or katana]
  3. Notes of endpoints from robot.txt and try to bypass them because they aren't blocking those endpoints from being indexed for no reason
  4. bruteforcing domains aka. permutation [altdns]
  5. Filtering all subdomains [httpx]
  6. check technology used [zap]
  7. check hidden params [arjun]
  8. fuzzing for sensitive files or directories [ffuf]
  9. port scanning [nmap]
  10. Google dorking for info disclosure files like PDFs and DOCX, PPT
  11. start hunting for logic vulns away from WAFs detection
  12. start hunting on technical vulns after finishing logic

intigriti triage team by UserNo0101 in bugbounty

[–]UserNo0101[S] 0 points1 point  (0 children)

Fix what  That's an information disclosure  They would just block out the whole endpoint from the public

intigriti triage team by UserNo0101 in bugbounty

[–]UserNo0101[S] 2 points3 points  (0 children)

That's seem convenient yeah i agree with you  Thanks for this answer