let’s see if i can able to perform Open Redirection
Steps: Go to https://web.target.com & login. 2. Now go to profile and add whats-app number.submit victim number/test number. 3. Intercept that request in Burp Suite and send it to repeater. 4. Now i change the “domain”: in request to “domain”:”https://bing.com" the request & response look like: check both request and response 5. Now the victim receives a message from Target.com official whats-app account. victim click on link and redirected to attackers domain. But that’s a low severity issue and doesn’t seem a security concern. So i just did one thing and try to leverage it to some serious vulnerability. 6. After verification of Whats app number i requested for password reset token. And captured that request in burpsuite. 7. Changed the “domain” to Ngrok URL and got message with reset link. 8. same time got a request in Ngrok dashboard, which carry password reset token. 9. I used that token to reset password of victim account. Impact: This vulnerability can leads to account takeover. The company fixed the vulnerability and rewarded meπŸ’²πŸ’²πŸ’². Twitter: https://twitter.com/Mah3Sec_

Komentar