easy $100 | bypass 403 to 200 ok
好,我现在要帮用户总结这篇文章的内容。首先,我需要仔细阅读文章,理解作者的主要观点和步骤。 文章讲的是作者通过简单的网络 reconnaissance(侦察)发现了漏洞,并最终获得了100美元的漏洞赏金。他使用了Shodan进行侦察,找到了目标网站的一个子域名。接着,他使用dirsearch工具进行目录遍历,发现了一个返回403错误的.env文件。虽然直接访问被Cloudflare的WAF阻止了,但作者通过查找真实的服务器IP,绕过了WAF,成功获取了.env文件。 这个文件包含了数据库凭证、会话签名密钥和内部API路由等敏感信息。作者指出,WAF只能保护它前面的内容,如果原服务器暴露了,WAF就不起作用了。因此,这次漏洞利用不仅泄露了文件内容,还完全绕过了安全控制。 最后,作者报告了这个漏洞,并迅速得到了修复和奖励。 现在我需要将这些信息浓缩到100字以内,并且不使用“文章内容总结”这样的开头。要确保涵盖主要步骤:使用Shodan找到目标、目录遍历发现.env、绕过WAF、获取敏感信息、漏洞报告和奖励。 可能的结构是:简单侦察→发现漏洞→绕过WAF→获取敏感信息→报告并获得奖励。 这样可以确保在字数限制内传达所有关键点。 </think> 通过简单的网络侦察和目录遍历工具dirsearch发现目标网站的.env文件泄露。尽管Cloudflare WAF阻止了直接访问,但通过查找真实服务器IP成功绕过WAF并获取文件。该文件包含数据库凭证、会话密钥等敏感信息。报告漏洞后获得100美元奖励。 2026-1-25 14:25:4 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Swarnim Bandekar

can you even imagine what most people do?
they do recon, burst out some payloads and think that’s bbh?
naahh man, ill show you how a simple recon got me $100

Press enter or click to view image in full size

Press enter or click to view image in full size

I used shodan for the recon. I put the target in the query and I got various results where one was updated on the same day when I was checking.
https://www.shodan.io/search?query=redacted.com

Press enter or click to view image in full size

I than went to https://sub.sub.redacted.com and found a page which had literally nothing in it.

then i thought of fuzzing the website, i used dirsearch with the common wordlist.

dirsearch -u https://sub.sub.redacted.com/

i got to see a 403 on /.env which says the file is available but not accessible and when i tried to visit https://sub.sub.redacted.com/.env i got a cloudflare error saying “Sorry, you have been blocked You are unable to access redacted.com

One Question That Matters

If the WAF blocks me
what is it protecting?

A WAF only protects what it sits in front of.
If the origin server is exposed
the WAF means nothing.

So I went looking for the real server.

Shodan Changed Everything

WAF Bypass in One Step

Accessing the application through the origin IP completely bypassed the WAF.
No filters
No blocks
No warnings

Get Swarnim Bandekar’s stories in your inbox

Join Medium for free to get updates from this writer.

Requesting the .env file returned a clean 200 OK.

The production environment file was exposed.

What Was Leaked

The file contained critical production secrets.

Database credentials
Session signing keys
Internal API routes

This was more than a file leak.
It was a full security control bypass.

Why This Is Serious

An attacker could avoid every WAF rule.
No rate limiting
No injection filters
No detection
With valid credentials, backend systems were within reach.
This is how small misconfigs turn into big breaches.

reported it and got it fixed quickly with a P2 with $100, not much but not bad i guess.


文章来源: https://infosecwriteups.com/easy-100-bypass-403-to-200-ok-b6bc126e2f4b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh