Parameter Pollution Party: How Duplicate Keys Crashed the API & Spilled All the Secrets
文章讲述了一次HTTP参数污染攻击的实践经历,通过发送重复URL参数成功绕过身份验证,访问内部API并获取隐藏数据,展示了如何利用技术细节发现并利用漏洞。 2025-9-22 12:57:19 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Iski

Free Link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

From discovering duplicate parameters to bypassing authentication, accessing internal APIs, and uncovering hidden data. Join my journey of HTTP Parameter Pollution exploitation with full technical PoC. ☕

You know that feeling when you show up to a party uninvited and accidentally become the life of it? 🎊 That was me — but instead of a party, it was a multi-million dollar company’s API endpoint, and instead of funny stories, I brought duplicate URL parameters that crashed their system and spilled all their secrets. My cat watched in judgment as I celebrated finding a bug more predictable than my morning coffee routine.

It all started on a boring Wednesday. Coffee in hand ☕, I was testing a fancy SaaS application — let’s call them cloudapi.com. I'd found an interesting endpoint during recon:

GET /api/v1/user/profile?userId=12345

文章来源: https://infosecwriteups.com/parameter-pollution-party-how-duplicate-keys-crashed-the-api-spilled-all-the-secrets-f2352d6620ab?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh