Executive summary
Explain the application feature/functionality which is affected.
This vulnerability allows a malicious user to
- Example, explanation.
- Example, explanation.
- Example, explanation.
- Example, explanation.
For demonstration purposes, the following staff accounts were used:
| Role | User A | User B | |
|---|---|---|---|
| Admin | account1@bugcrowdninja.com |
X | |
| Normal | account2@bugcrowdninja.com |
X |
- Enable browser proxy intercept
- Sign into the application:
[>
URI](URI)
- Click on the X button within the "Y" dialogue box
POST /path
- As the user, do X
<#image placeholder> <#image placeholder>
- Enable browser proxy intercept
- Sign into the application:
- Click on the X button within the "Y" dialogue box
POST /path
<#image placeholder>
- Before clicking doing X, forward the request to Replay/Repeater
POST /path
Original request:
POST /path HTTP/1.1
Host: example.com
User-Agent: PoC-Agent/1.0
Content-Type: application/json
Content-Length: 123
{
"action": "doX",
"target_id": "12345",
"example": "value"
}<#image placeholder>
- Edit the structure of the request:
- Explain step:
- For this example, change the body field example to demonstrate missing/modified parameter handling.
# example: change "example" value or remove the parameter entirely
# original body:
# {"action":"doX","target_id":"12345","example":"value"}
# modified body:
# {"action":"doX","target_id":"12345"}- Remove the following parameters from the request and their respective values:
example
- Send the request to Automate/Intruder, the final request should look like this as an example:
Modified request:
POST /path HTTP/1.1
Host: example.com
User-Agent: PoC-Agent/1.0
Content-Type: application/json
Content-Length: 89
{
"action": "doX",
"target_id": "12345"
}<#image placeholder>
- Send the request
- Observe server response:
Server response:
HTTP/1.1 200 OK
content-type: application/json- In the victim account, XYZ.
I've attached a full video PoC for your reference too - example
Note: Within the video PoC I already customized a dashboard as the victim.
- Example
Example