💎My methodology

curl -X GET "https://login.rbleipzig.com/en/sso/login?apiKey=4_htVHQTXwdHjOTKV1hr61rg" | grep -i -E 'location.href|location.search|window.location|window.hash|window.location.href|location.search|location.pathname|document.URL|getparam|getUelParameter|getParameter()|parameter|innerHTML|outerHTML|document.write|document.writeln|var ='

Open redirects in the login flow mostly have the session token or any other auth token in the query param.

inurl:register | intitle:register | inurl:signup | intitle:signup | intext:signin site:.who.int
in the name field: <img src=x onerror​=alert(origin)> in the name field.
Credentials
hunter2-ywh-f6a5371da6033e99@yeswehack.ninja
swag@bugcrowdninja.com
Python@123

server-side redirects always use Location response header with 3XX status code If missing Location response header but still redirects (after a small delay), it DOM-based redirect

Run open-dork.sh Script

Check Server and client side redirect then Exploit Further

Find XSS Steps

  • Check Subdomains.sh to tech based Filters Domains

  • Check Ext-dork to tech based Filters Domains

  • Check Shodan-dork to tech based Filters Domains

  • Run ext-dork.sh Script with Specific Domain

Check Hidden Paths inroborts.txt

  • Run hostname:"mytoken.us.dell.com" Shodan

  • Run host:"mytoken.us.dell.com" Fofa

  • nslookup mytoken.us.dell.com

  • Run Fuzzing with FFUF

  • Run Fuzzing with Gobuster

  • Run Fuzzing with Dirsearch

  • Run Arjun

  • Run Parampp

  • Run x8 with parameters wordlist

  • https://xss.report/dashboard swagpk Synack@3434

  • https://bxsshunter.com/dashboard Synack@3434

---------------------------------------------------------------------

2

DOM XSS Check In Redirect Parameters

3

If Access token available In Redirect URL then Check Account take Over

OR Check with Burp Collaborater And Webhook URL

4

SSRF Check In Redirect OR Data Fetch and File Download Parameters

5

if SSRF then check to Reflected XSS

Example: https://mop4.com/?url=https://brutelogic.com.br/poc.svg

6

if SSRF then check to RCE

7

Blind XSS Check to Account take Over

swagpk Synack@3434
Synack@34343
8

Find File upload Vulnerabilities like: RCE-SXSS-SSRF-LFI

  • Check SVG File to Tacking it to Credentials Theft

  • Check SVG File to Stored XSS

  • Check Docx File to HTML

  • Check Docx File to SSRF

  • Check XSS in Reflected File Name

  • Check PHP Function to LFI

  • Check PHP Reverse Shell to RCE

  • Observe that which PHP RCE functions:popen(),system(), shell_exec(), passthuru() and file read functions like incluce(),require(),file_get_contents() were disabled and enabled this php Application

  • Craft Reverse Shell payload with that PHP function and save it into the file name shell.php if client-side validation to bypass it Shell.php.jpg

  • intercept the file upload request in burpsuite and removed the .jpg extension and forwarded the file upload request to the server.

9

Burp Suite And Browser Setting for find XSS

10

Find Disallow Path for Fuzzing

11

Find Origin IP with Favicon hash for find Endpoints

12

Find Hidden Endpoints FOR Fuzzing

13

Find Hidden Parameters

14

Find XSS vulnerable Endpoint to check in other Subdomains

15

Confirm Vulnerable Parameter for Html injection OR Reflected XSS

16
17

Find Origin IP for Bypass WAF

20

Dork for finding Swagger DOM XSS

21

if GET Parameter Check for LFI and Path traversal

22

LFI to RCE

Last updated