Exploiting Server-side Parameter Pollution in a Query String

Sdílet
Vložit
  • čas přidán 5. 09. 2024

Komentáře • 19

  • @r3plican
    @r3plican Před 6 měsíci +2

    can u do more analyzing the source code of the vulnerability and try to look it out and fix it

    • @intigriti
      @intigriti  Před 6 měsíci +1

      Heyyy, quite often with these labs we don't get access to the source code but at the end of a topic we review the mitigations / defenses. Request noted though! Maybe I can put together some simple code snippets for some examples.

  • @user-uh8ko8ik5w
    @user-uh8ko8ik5w Před měsícem

    Thank you for showing everything clearly!

  • @IbnRafael
    @IbnRafael Před 2 měsíci

    @intigriti I don't get why reset_token was added to the field parameter? field=reset_token. Aren't they both parameters? What is the logic behind this?

    • @intigriti
      @intigriti  Před 2 měsíci +1

      The "field" is indeed the parameter, but since we saw "email" was a valid value for the field parameter, it makes sense that other form fields on the page would also be accepted ("reset_token" in this case).

  • @k.k6349
    @k.k6349 Před 2 měsíci

    burp suite intruder tab add from list is available in pro version only

    • @intigriti
      @intigriti  Před 2 měsíci

      The pre-set lists are pro-only but you should be able to import your own wordlist, with one word on each line

  • @Yuhisern
    @Yuhisern Před 2 měsíci

    Yo awesome Im doing this now

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 Před 6 měsíci

    Great video buddy

  • @doya8130
    @doya8130 Před 5 měsíci

    it's great video

  • @mnageh-bo1mm
    @mnageh-bo1mm Před 6 měsíci

    well the lab solution seems to be way too unrealistic...what was even that?

    • @intigriti
      @intigriti  Před 6 měsíci +1

      Which part? Is it not realistic that a company would have an internal API, not accessible through the internet? Or that they might pass some user input to that API? 🤔

    • @mnageh-bo1mm
      @mnageh-bo1mm Před 6 měsíci

      @@intigriti yes why would that even be an option? It's no longer about pollution.... It's simply undocumented functionality of the api

    • @intigriti
      @intigriti  Před 6 měsíci +1

      Undocumented functionality is the source of many vulnerabilities! You could have an undocumented function with an XSS or SQLi vulnerability, why not one with a parameter pollution vuln? 🙂

    • @mnageh-bo1mm
      @mnageh-bo1mm Před 6 měsíci

      @@intigriti lmao u right thx 😔😔