Don't miss this opportunity to boost your cybersecurity career!
#sponsored by
Please open Telegram to view this post
VIEW IN TELEGRAM
๐๐๐ ๐ข๐ง ๐๐ก๐จ๐ง๐ ๐๐ฎ๐ฆ๐๐๐ซ ๐
๐ข๐๐ฅ๐ ? ๐
Recently I re-watched the NahamCon2022EU: RTFR (Read The Bleeping RFC) by securinti
One thing I was surprised to find out was that phone number fields can be vulnerable to XSS.
How is that possible?
According to the RFC it is possible to append "optional parameter" to the number. Something like:
โข 10203040;๐๐ฑ๐ญ=+22
โข 10203040;๐ข๐ฌ๐ฎ๐=12345
โข 10203040;๐ฉ๐ก๐จ๐ง๐-๐๐จ๐ง๐ญ๐๐ฑ๐ญ=๐๐ฑ๐๐ฆ๐ฉ๐ฅ๐
This can lead to XSS if:
1. The library parses phone numbers according to RFC and accepts optional parameters such as "phone-context"
2. The phone number is reflected on the web interface without input validation or output encoding
So payloads like "10203040;๐ฉ๐ก๐จ๐ง๐-๐๐จ๐ง๐ญ๐๐ฑ๐ญ=<๐ฌ๐๐ซ๐ข๐ฉ๐ญ>๐๐ฅ๐๐ซ๐ญ(1)</๐ฌ๐๐ซ๐ข๐ฉ๐ญ>" CAN be a valid phone number and trigger XSS
Recently I re-watched the NahamCon2022EU: RTFR (Read The Bleeping RFC) by securinti
One thing I was surprised to find out was that phone number fields can be vulnerable to XSS.
How is that possible?
According to the RFC it is possible to append "optional parameter" to the number. Something like:
โข 10203040;๐๐ฑ๐ญ=+22
โข 10203040;๐ข๐ฌ๐ฎ๐=12345
โข 10203040;๐ฉ๐ก๐จ๐ง๐-๐๐จ๐ง๐ญ๐๐ฑ๐ญ=๐๐ฑ๐๐ฆ๐ฉ๐ฅ๐
This can lead to XSS if:
1. The library parses phone numbers according to RFC and accepts optional parameters such as "phone-context"
2. The phone number is reflected on the web interface without input validation or output encoding
So payloads like "10203040;๐ฉ๐ก๐จ๐ง๐-๐๐จ๐ง๐ญ๐๐ฑ๐ญ=<๐ฌ๐๐ซ๐ข๐ฉ๐ญ>๐๐ฅ๐๐ซ๐ญ(1)</๐ฌ๐๐ซ๐ข๐ฉ๐ญ>" CAN be a valid phone number and trigger XSS
1๐28๐ฟ6โค2
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficientlyโฆ
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty - RevoltSecurities/Subdominator
โค3๐1
https://github.com/tomnomnom/gron
This is one of the best tools for dealing with large JSON data. It makes it easier to query complex JSON and turn it into different formats
This is one of the best tools for dealing with large JSON data. It makes it easier to query complex JSON and turn it into different formats
GitHub
GitHub - tomnomnom/gron: Make JSON greppable!
Make JSON greppable! Contribute to tomnomnom/gron development by creating an account on GitHub.
I use it always to test web api that sends or receives big json blobs to understand what it's actually doing
๐3
Free TryHackMe Access
If youโre unable to purchase a personal voucher, you can use the following account for learning purposes:
TryHackMe Premium Account
Email: [email protected]
Password: pasderemarque@123
Please use the account responsiblyโdo not change or delete any settings or information.
If youโre unable to purchase a personal voucher, you can use the following account for learning purposes:
TryHackMe Premium Account
Email: [email protected]
Password: pasderemarque@123
Please use the account responsiblyโdo not change or delete any settings or information.
โค86๐11๐ฅ2
Please open Telegram to view this post
VIEW IN TELEGRAM
Teachable
Windows Api Security Professional
โค3
Brut Security
First Review
XSS from javascript hidden params
assetfinder *.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"
2๐ฅ19๐3โค2
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅ6๐ฟ3๐ณ2โค1
- Register An account with email [email protected] on the target
- navigate to support section and see if there are any emails converted into support tickets
credit - NinadMishra
#bugbountytips
- navigate to support section and see if there are any emails converted into support tickets
credit - NinadMishra
#bugbountytips
๐ณ9๐3
Offsec has been acquired by an private equity.
https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html
https://www.prnewswire.com/news-releases/leeds-equity-partners-acquires-offsec-302275836.html
PR Newswire
Leeds Equity Partners Acquires OffSec
/PRNewswire/ -- Leeds Equity Partners ("Leeds Equity") announced today that it has acquired OffSec (the "Company"), the leading provider of continuous...
๐งโ๐ปCloakQuest3r - Uncover the true IP address of websites safeguarded by Cloudflare & Others
https://github.com/spyboy-productions/CloakQuest3r
https://github.com/spyboy-productions/CloakQuest3r
2๐ฅ12๐3
Argus is an all-in-one information gathering tool crafted for ethical hackers and cybersecurity experts. It seamlessly integrates network analysis, web exploration, and threat detection, all in a sleek and intuitive interface. Argus turns complex reconnaissance into an art of simplicity.
---
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - jasonxtn/Argus: The Ultimate Information Gathering Toolkit
The Ultimate Information Gathering Toolkit. Contribute to jasonxtn/Argus development by creating an account on GitHub.
๐7
CVE-2024-9634: RCE in GiveWP WordPress Plugin, 9.8 rating ๐ฅ
Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.
Search at Netlas.io:
๐ Link: https://nt.ls/9tUYx
๐ Dork: http.body:"plugins/give/assets/dist"
Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.
Search at Netlas.io:
๐ Link: https://nt.ls/9tUYx
๐ Dork: http.body:"plugins/give/assets/dist"
Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
๐5โค3