A story of another awesome old school hacking that lead to a cool P1 bug
2021-10-26 02:56:39 Author: infosecwriteups.com(查看原文) 阅读量:33 收藏

or how Response 200 OK w/ size 0 doesn’t always mean 0

Vuk Ivanovic

There are times when things don’t align all that well. Like finding some subdomain that has 403 and running all the wordlists against it doesn’t amount to anything, and only interesting thing is some random endpoint that is size 0. Sure, you ought to try POST request against it because maybe there’s something there, or messing around with headers and so on. But when that doesn’t work, what then? Well, if the stars align a bit better, while the response size 0 still presents that there’s nothing in the body of that page, the Response headers like Server and X-Powered-By may lead to quite a lot.

On to the hack — Part 1

While it’s very nifty to use various tools to determine what the target is running, there’s nothing like manually checking out the target’s responses to your requests. The best way to go about it has always been burp. Be it free or paid version, both offer the essential — being able to see entire Response output with all the headers that the target is configured to disclose. The same can be achieved in other ways, but burp offers most readable format, imho.

And so it happened that I found a random directory which ffuf marked as 200 OK and size 0, but because I wanted to mess around with headers as per my other articles:

So, I figured to access this boring sounding directory through burp and see if maybe I can achieve some ssrf or similar while messing with headers. And while that didn’t result in anything interesting, I did notice something interesting in the response headers.

Note the X-Powered-By header in this response.

On to the hack — Part 2

Here’s the real old school approach. A simple google search for jboss 4.0.3 tomcat-5.5 hackerone.com lead to useful writeups. The one that worked on this had to do with adding %5C.. as a way to bypass any 401/403 protections.

somewhat modified screenshot to protect the affected party

It just shows yet again the importance of manually testing even things that look as though there’s nothing to them.


文章来源: https://infosecwriteups.com/a-story-of-another-awesome-old-school-hacking-that-lead-to-a-cool-p1-bug-f88da04b1ecf?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh