💎My methodology
curl -X GET "https://login.rbleipzig.com/en/sso/login?apiKey=4_htVHQTXwdHjOTKV1hr61rg" | grep -i -E 'location.href|location.search|window.location|window.hash|window.location.href|location.search|location.pathname|document.URL|getparam|getUelParameter|getParameter()|parameter|innerHTML|outerHTML|document.write|document.writeln|var ='inurl:register | intitle:register | inurl:signup | intitle:signup | intext:signin site:.who.intin the name field: <img src=x onerror=alert(origin)> in the name field.hunter2-ywh-f6a5371da6033e99@yeswehack.ninja
swag@bugcrowdninja.com
Python@123Check Server and client side redirect then Exploit Further
Find XSS Steps
---------------------------------------------------------------------
1
Open Redirect GET-Based in Register-Login-logout-signup and Reset-Password Page URL
3
If Access token available In Redirect URL then Check Account take Over
OR Check with Burp Collaborater And Webhook URL
7
Blind XSS Check to Account take Over
16
18
Create and Customize XSS Payload According WAF and Regex
19
RXSS to Account Take Over
23
if GET Parameter Check for SQL injection

Last updated


