Desync or Die Trying: Smuggling My Way into Internal APIs
作者讲述了一次因HTTP请求走私漏洞成功入侵生产后端的经历,在早晨的一系列倒霉事件后发现了内部API和敏感数据,并获得了一个独特的500错误页面。 2025-7-1 12:1:45 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Iski

Free Link 🎈

Hey there!😁

Image by Gemini AI

When Life Gives You Desync, Smuggle a Shell In 🌈🤔

I once burnt toast, missed my cab, spilled coffee, and still managed to compromise a production backend — all before 11 AM. That’s what happens when you’re powered by caffeine, curiosity, and a mild hatred for poorly configured load balancers.

This is the story of how a sneaky HTTP Request Smuggling (HRS) vulnerability turned a boring recon into a jackpot of internal APIs, sensitive data, and the most beautiful 500 Internal Error I've ever seen.

I was running mass recon one fine Tuesday morning. You know the drill:

subfinder -d target.com | httpx -mc 200 -title -tech-detect > alive.txt

One endpoint screamed “reverse proxy config from 2012” — it was on api.target.com. I took a closer look using Burp Suite and noticed this odd behavior:


文章来源: https://infosecwriteups.com/desync-or-die-trying-smuggling-my-way-into-internal-apis-e59e1bf6f01d?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh