Это видео недоступно.
Сожалеем об этом.

Cors misconfiguration | leads to sensitive information | Bug bounty poc

Поделиться
HTML-код
  • Опубликовано: 5 ноя 2023
  • in this video i am going to show you cors vulnerability poc how you can exploit it and report it.
    This video is only for education purpose only.
    #hackerone #bugbounty
    Disclaimer: This video is for strictly educational and informational purpose only. I own all equipment used for this demonstration. Hacking without permission is illegal so always ensure you have proper authorization before using security tools in any network environment. thanks.

Комментарии • 42

  • @zedvn3792
    @zedvn3792 2 месяца назад +1

    What tool do you use to find that endpoint?
    Can you share it with me?
    Thanks a lot

    • @lostsecc
      @lostsecc  2 месяца назад +1

      gau or katana

  • @Sakuraigi
    @Sakuraigi Месяц назад

    Hey bro, I discovered a cors misconfiguration in a subdomain which has ACAO set to a subdomain of that subdomain and ACAC set to true. However I can't provide a POC because the subdomain has only a search function that seem to be immune to XSS and a login forum. Registration in this sub is suspended to ensure quality so they aren't receiving new partners. Even if it is open, I think I won't be able to register with them as they have many eligible requirements! So what should I do? If I report, will I get a bounty or it will be wasted?

    • @lostsecc
      @lostsecc  Месяц назад

      cors only effctive in sensitive endpoints that are not publically exposed

  • @abhishekkumar_981
    @abhishekkumar_981 9 месяцев назад +1

    welldone

  • @thechannelofmine
    @thechannelofmine 4 месяца назад

    I found the same bug today at the same endpoint /wp-json/wp/v2/users , but the question is it accepted as information disclosure vulnerability?

    • @lostsecc
      @lostsecc  4 месяца назад

      if these informstive is public then they mark as informative but some program take it as serious ..

    • @thechannelofmine
      @thechannelofmine 4 месяца назад

      @@lostsecc can we talk somewhere else private i have an additional note

    • @thechannelofmine
      @thechannelofmine 4 месяца назад

      @@lostsecc if we try to get the cookie directly we get: `Refused to get unsafe header "Set-Cookie"` , i think it's because of httponly policy, is this bug still valid? can the attacker use https website to bypass the policy?

    • @lostsecc
      @lostsecc  4 месяца назад

      no if site is http only and secure flag set its not impactfull

  • @b4arabe132
    @b4arabe132 3 месяца назад

    Thanks for the video brother, brother i hope u answer me i found same bug and used the same poc and i got returned the content of the url by sending that request. Nad everything but the vulnerable. Url is like an api that contains some info thats not important u can say but the. Cors worked the poc returned content should i report it or no?

    • @lostsecc
      @lostsecc  3 месяца назад

      they mark as informative if the endpoint or info is not sensitive

    • @b4arabe132
      @b4arabe132 3 месяца назад

      @@lostsecc thank u bro

  • @brahmareddy5763
    @brahmareddy5763 2 месяца назад

    Finding CORS ok . But CORS.html file what it fetchs from the target bro?

    • @lostsecc
      @lostsecc  2 месяца назад

      the response that u get in burpsuite

  • @H4cker_Nafeed
    @H4cker_Nafeed 4 месяца назад

    Does CORS works only where there is no httponly in the cookies?

    • @lostsecc
      @lostsecc  4 месяца назад +1

      no that is for protecting xss cookie stealling..

    • @H4cker_Nafeed
      @H4cker_Nafeed 4 месяца назад

      @@lostsecc then how CORS works?

  • @ayoubelgana4581
    @ayoubelgana4581 9 месяцев назад

    impact ?

    • @lostsecc
      @lostsecc  9 месяцев назад +1

      Attackers can use CORS vulnerabilities to steal sensitive data from applications like API keys, SSH keys, Personal identifiable information (PII), or users' credentials.

    • @ayoubelgana4581
      @ayoubelgana4581 9 месяцев назад

      @@lostsecc really ? Bc i sent report to bugcrowd about the same vulnerability, but they classified it as not applicable

    • @ayoubelgana4581
      @ayoubelgana4581 9 месяцев назад

      @@lostsecc u have discord ?

    • @lostsecc
      @lostsecc  9 месяцев назад +1

      its depend on the impact..these information are publically available so they mark as informative...better to look for sensitive endpoint ..

    • @ayoubelgana4581
      @ayoubelgana4581 9 месяцев назад +2

      @@lostsecc Pls, do you have discord so i can contact you ?

  • @CywerLearning
    @CywerLearning 6 месяцев назад

    Code send ??

    • @lostsecc
      @lostsecc  6 месяцев назад

      search coffinxp github

    • @CywerLearning
      @CywerLearning 5 месяцев назад

      @@lostseccnot find can you send ?? Plz in drive folder

    • @vikas340
      @vikas340 5 месяцев назад

      @@lostseccplease send

    • @vikas340
      @vikas340 5 месяцев назад

      @@lostsecccode download in drive folder please

    • @lostsecc
      @lostsecc  5 месяцев назад

      i will send in telegram @lostsec soon