https://alvinsmith.gitbook.io/progressive-oscp/untitled/vulnversity-privilege-escalation
[Unit]
Description=roooooooooot
[Service]
Type=simple
https://alvinsmith.gitbook.io/progressive-oscp/untitled/vulnversity-privilege-escalation
[Unit]
Description=roooooooooot
[Service]
Type=simple
Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown file
An open redirect was almost everything I needed in two different bug bounty programs to get access to user accounts. In one of the cases a JWT was leaked, and in the other the CSRF token was leaked. The issue was mostly the same in both cases: not validating, or URI encoding, user input in the client-side, and sending sensitive information to my server using an open redirect.
x-csrf-token
set to the CSRF token for the session of the user
GET /verify/VALUE HTTP/1.1
Host: example.com
@ | |
* | |
0 | |
00 | |
0-0 | |
000 | |
0000 | |
00000 |