Captcha bypass
1- Proof of Concept
Create a new request by entering right captcha value.
Intercept the request in a proxy tool.
The request will look like this:
Now change the method from POST to PUT and right submit the request.
The request will look like:
Repeat the request for any number of times and observe that every time instead of checking for a new captcha value, the old value or ANY VALUE from captcha is accepted.
-------------------------------------------------------------
2- Proof of Concept
https://www.coinbase.com/signup
Fill the input field and Validate the captcha.
Trun on Brurp submit form and capture the request.
Remove the g-recaptcha-response( response value) and foreword it.
Impact:
Fake accounts can be created. Also username enumeration can be performed because no application will allow two email to choose same email.
-------------------------------------------------------------
3- Proof of Concept
https://www.website.com/login
Fill the input field and Validate the captcha.
Trun on Brurp submit form and capture the request.
Remove the recaptcha-response( response value with Header) and foreword it.
-------------------------------------------------------------
Last updated