My $20,000 S3 bug that leaked everyone’s attachments - S3 bucket misconfig of pre-signed URLs

Поделиться
HTML-код
  • Опубликовано: 29 сен 2024

Комментарии • 86

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  Год назад +13

    I hoped you enjoyed the video! If you want to learn even more with me, go to bbre.dev/premium

  • @criticalthinkingpodcast
    @criticalthinkingpodcast Год назад +18

    Thanks for the shout-out and congrats on the great bug!

  • @animeshacharya7803
    @animeshacharya7803 Год назад +9

    Great video! Congrats on the bounty :)

  • @rafajanicki2456
    @rafajanicki2456 Год назад +6

    Awesome finding Grzegorz, congratulations :) Thank you for sharing all the details as well!

  • @skytest1247
    @skytest1247 Год назад +5

    clean and clever! I already guessed what you got after reading your bounty tweet! congrats

  • @_bergee_
    @_bergee_ Год назад +4

    Gratulacje!!!! Ja ostatnio zrobiłem trochę wakacji w BB, ale jesienią mam zamiar powrócić do tematu.

  • @papkonstantinos6757
    @papkonstantinos6757 11 месяцев назад +1

    Congratulations

  • @renganathanofficial
    @renganathanofficial 11 месяцев назад +3

    This is an amazing finding, congrats mate!

  • @hptech7052
    @hptech7052 Год назад +2

    Damnn! Congrats:)

  • @TheVirusmy
    @TheVirusmy Год назад +1

    Congratulations

  • @FrankTranDesign
    @FrankTranDesign Год назад +1

    Thank you for this content--it's so eloquent!

  • @souraldandothi5681
    @souraldandothi5681 8 месяцев назад

    well explained!

  • @yuvraj6279
    @yuvraj6279 Год назад +1

    Nice find thanks for sharing bro

  • @thatbassplayercam
    @thatbassplayercam 8 месяцев назад

    Great video! I'm interested to know how you replicated the vulnerable server code. Would you be able to share?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  8 месяцев назад +1

      I asked chatgpt how this functionality can be implemented in my target's technology and then asked it to build a small webapp around it

  • @Lainad27
    @Lainad27 11 месяцев назад +1

    Well done!

  • @inderjeetsingh1340
    @inderjeetsingh1340 Год назад +1

    Nice finding!! 🎉

  • @AnkitSingh-gi5zw
    @AnkitSingh-gi5zw Год назад +1

    Congratulations Greg!

  • @TheYasserEzzat
    @TheYasserEzzat 8 дней назад

    I got the same bug and the team only awarded 3.5K

    • @alperkaya8919
      @alperkaya8919 5 дней назад

      Its still nice money

    • @TheYasserEzzat
      @TheYasserEzzat 4 дня назад

      @@alperkaya8919 many programs deal with each researcher differently.

  • @flashithackerone
    @flashithackerone 7 месяцев назад

    @BugBountyReportsExplained Hi bro. Congrats on your bounty!. I have one Small request. When you try to explain a vulnerability with multiple accounts of a program, Please use terms like Account A and Account B instead of using my account and another account. It would be very understandable. Rest you are doing amazing. Thanks for the Knowledge sharing!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  7 месяцев назад

      Do you want to say you had a problem with understanding this server-side path traversal bug just because I used the terms my account and victim's account instead of account A and B?🤔

    • @flashithackerone
      @flashithackerone 7 месяцев назад

      @@BugBountyReportsExplained Yes. But not for myself. Some of my friends are also learning from your channel. I cleared a doubt for them this time. it's their request.

  • @a_al_Jahin
    @a_al_Jahin 9 месяцев назад

    Greatt and also thanks a lottt for the video....Can you please provide the aws s3 param list's pdf file you showed in the video...?

  • @tomsawyer6247
    @tomsawyer6247 10 месяцев назад

    the fact that they use direct links to images to S3 should be a red flag - GET from S3 is expensive and AFAIK can't handle big scale

  • @jomynn
    @jomynn 7 месяцев назад

    Where are your report the bug to target website or Amazon?

  • @Blank_Chy
    @Blank_Chy 11 месяцев назад

    god awesome, 8:50 I've been learning about bug bounty and learning basic webs develop and sql, python 2023 since early this year, but I'm still confused about how to report low impact vulnerability methods. for the beginners bug bounty Do you have any suggestions for me?

  • @duskb1t
    @duskb1t 11 месяцев назад

    Congratulations. This was a really interesting video. Btw, I would recommend that you fix the audio ups and downs between your face cam and the presentation.

  • @SixMar-c1m
    @SixMar-c1m 10 месяцев назад

    The third step you gave another account name was in the intercept (Burp) or by inspecting the elements tab in browser?

  • @fabiothebest89lu
    @fabiothebest89lu 7 месяцев назад

    Nice video, thanks and congrats for the bounty

  • @__CJ.__
    @__CJ.__ 11 месяцев назад

  • @crlfff
    @crlfff 5 месяцев назад

    4:13

  • @edavidwaner2187
    @edavidwaner2187 11 месяцев назад

    hey bro thanks for sharing this video
    now i have one more thing to spend more time in applications😅
    do not stop ❤

  • @michalk7802
    @michalk7802 Год назад

    cool, congrats. nice video all the best!

  • @stanlyoncm
    @stanlyoncm Год назад

    I can feel that excitement, I feel the same when I catch a big fish!

  • @vz7742
    @vz7742 11 месяцев назад

    Congrats mate,you just got a new sub ;)

  • @nguyenquockhanh3920
    @nguyenquockhanh3920 7 месяцев назад

    At paragraph 8:00, I see you mentioned changing the max-key to list all filenames, folders,...
    But somehow, I tried adding the max-keys parameter and got an error: "The request signature we calculated does not match the signature you provided. Check your key and signing method."
    Please tell me how to list all filenames and folders using max-keys.
    Thanks

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  7 месяцев назад

      Max-keys is only used to control how many elements should be listed

    • @nguyenquockhanh3920
      @nguyenquockhanh3920 7 месяцев назад

      @@BugBountyReportsExplained But the default pre-signed URLs method will list a maximum of 1000. How can you list more as you mentioned in the video? Add any param or any tricks.....

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  7 месяцев назад

      @@nguyenquockhanh3920try adding the param before you sign the URL

    • @nguyenquockhanh3920
      @nguyenquockhanh3920 7 месяцев назад

      @@BugBountyReportsExplained In the case of your report, how did you do it? Have you also tried adding this param before it signs and was it successful?

  • @dominicksavio1221
    @dominicksavio1221 Год назад

    Congratulations nice bug❤

  • @sven5666
    @sven5666 11 месяцев назад

    Great explanation. Last third of the video was really valuable and very well explained.

  • @ClashWithHuzefa
    @ClashWithHuzefa 11 месяцев назад

    Congrats for the bounty bro

  • @mohittirkey7889
    @mohittirkey7889 7 месяцев назад

    Amazing video. Thank You for the details. Quick question , when you provided the path of the directory in the filename (../) , didnt the application perform any check for the file extension ?

  • @broomandmopmop
    @broomandmopmop 9 месяцев назад

    Love your channel bro

  • @albertcorzo
    @albertcorzo 11 месяцев назад

    Awesome information

  • @expert2570
    @expert2570 11 месяцев назад

    But it didn't expire after 3600 seconds? due to X-Amz-Expires parameter?

  • @monKeman495
    @monKeman495 Год назад

    Finally this video happened found that pre signed urls very interesting max expiring of sharable object 12hr or 7days ?
    thank you for sharing

  • @ctfs09
    @ctfs09 11 месяцев назад

    If you could list the the bucket with ../ as file name, bucket seems public, did you try to list the bucket through aws-cli?

  • @SirMarthes
    @SirMarthes Год назад

    Nice finding!
    Pozdrowienia od mateuszka z h1 :)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад +1

      kojarzę z niejednego leaderborda ;) mam nadzieję że spotkamy się na jakiejś konfie

  • @Zizo8182
    @Zizo8182 Год назад

    thanks for sharing

  • @hackingstudy-g5h
    @hackingstudy-g5h 11 месяцев назад

    Amazing bug!

  • @budhiridholmahfudz5806
    @budhiridholmahfudz5806 11 месяцев назад

    Awsome sir👍

  • @DEADCODE_
    @DEADCODE_ Год назад

    great Bud

  • @kevinwydler7305
    @kevinwydler7305 Год назад

    Congrats on the bounty!

  • @ashiqurrahman275
    @ashiqurrahman275 11 месяцев назад

    Thanks

  • @benasin1724
    @benasin1724 Год назад +1

    Congratulations!

  • @bertrandfossung1216
    @bertrandfossung1216 Год назад

    Congratulations on your bounty. You did great

  • @MaxMode84
    @MaxMode84 11 месяцев назад

    Mądry gość.

  • @ДмитрийХимченко-ь4б

    Congratulations!🎉

  • @zbyszggo4626
    @zbyszggo4626 Год назад +1

    Dobra robota mordo :)

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 Год назад

    Well done dude

  • @dhirajsoren8428
    @dhirajsoren8428 Год назад

    Cool bug

  • @raihanhossain3423
    @raihanhossain3423 Год назад

    What microphone you are using?

  • @amrelganainy0
    @amrelganainy0 Год назад

    Amazing

  • @aqwerzerd
    @aqwerzerd 11 месяцев назад

    need that pdf at 7:51 thank you

  • @whateveritis0
    @whateveritis0 Год назад

    🎉

  • @forxstsombodi3043
    @forxstsombodi3043 Год назад +2

    Like the video, thanks for sharing. The audio levels are a bit weird. seems like when you toggle between screenshare and face cam there's some difference in the audio. Kinda jumpscared me.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад

      Yep, sorry for scarring you! I didn't normalise the audio level across different clips and I uploaded it just before leaving and didn't have time to fix

  • @DeepakKumar-ym1wr
    @DeepakKumar-ym1wr Год назад

    Congrats keep it keep uploading videos