You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: API Key Leaks/IIS-Machine-Keys.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -16,12 +16,6 @@
16
16
*[References](#references)
17
17
18
18
19
-
**Requirements**
20
-
21
-
*`__VIEWSTATE`
22
-
*`__VIEWSTATEGENERATOR`*
23
-
24
-
25
19
## Viewstate Format
26
20
27
21
ViewState in IIS is a technique used to retain the state of web controls between postbacks in ASP.NET applications. It stores data in a hidden field on the page, allowing the page to maintain user input and other state information.
@@ -135,6 +129,12 @@ List of interesting machine keys to use:
135
129
136
130
First you need to decode the Viewstate to know if the MAC and the encryption are enabled.
Copy file name to clipboardexpand all lines: CORS Misconfiguration/README.md
+33-22
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,21 @@
2
2
3
3
> A site-wide CORS misconfiguration was in place for an API domain. This allowed an attacker to make cross origin requests on behalf of the user as the application did not whitelist the Origin header and had Access-Control-Allow-Credentials: true meaning we could make requests from our attacker’s site using the victim’s credentials.
4
4
5
+
5
6
## Summary
6
7
7
8
*[Tools](#tools)
8
-
*[Prerequisites](#prerequisites)
9
+
*[Requirements](#requirements)
9
10
*[Exploitation](#exploitation)
11
+
*[Origin Reflection](#origin-reflection)
12
+
*[Null Origin](#null-origin)
13
+
*[XSS on Trusted Origin](#xss-on-trusted-origin)
14
+
*[Wildcard Origin `*` without Credentials](#wildcard-origin--without-credentials)
15
+
*[Expanding the Origin](#expanding-the-origin)
16
+
*[Labs](#labs)
10
17
*[References](#references)
11
18
19
+
12
20
## Tools
13
21
14
22
*[s0md3v/Corsy - CORS Misconfiguration Scanner](https://github.com/s0md3v/Corsy/)
@@ -17,17 +25,19 @@
17
25
*[trufflesecurity/of-cors - Exploit CORS misconfigurations on the internal networks](https://github.com/trufflesecurity/of-cors)
18
26
*[omranisecurity/CorsOne - Fast CORS Misconfiguration Discovery Tool](https://github.com/omranisecurity/CorsOne)
* VICTIM HEADER> `Access-Control-Allow-Origin: https://evil.com` OR `Access-Control-Allow-Origin: null`
25
34
35
+
26
36
## Exploitation
27
37
28
38
Usually you want to target an API endpoint. Use the following payload to exploit a CORS misconfiguration on target `https://victim.example.com/endpoint`.
29
39
30
-
### Vulnerable Example: Origin Reflection
40
+
### Origin Reflection
31
41
32
42
#### Vulnerable Implementation
33
43
@@ -87,7 +97,7 @@ or
87
97
</html>
88
98
```
89
99
90
-
### Vulnerable Example: Null Origin
100
+
### Null Origin
91
101
92
102
#### Vulnerable Implementation
93
103
@@ -128,7 +138,7 @@ origin in the request:
128
138
</script>"></iframe>
129
139
```
130
140
131
-
### Vulnerable Example: XSS on Trusted Origin
141
+
### XSS on Trusted Origin
132
142
133
143
If the application does implement a strict whitelist of allowed origins, the
134
144
exploit codes from above do not work. But if you have an XSS on a trusted
### Vulnerable Example: Wildcard Origin `*` without Credentials
152
+
### Wildcard Origin `*` without Credentials
143
153
144
154
If the server responds with a wildcard origin `*`, **the browser does never send
145
155
the cookies**. However, if the server does not require authentication, it's still
@@ -178,7 +188,9 @@ function reqListener() {
178
188
};
179
189
```
180
190
181
-
### Vulnerable Example: Expanding the Origin / Regex Issues
191
+
192
+
### Expanding the Origin
193
+
182
194
Occasionally, certain expansions of the original origin are not filtered on the server side. This might be caused by using a badly implemented regular expressions to validate the origin header.
183
195
184
196
#### Vulnerable Implementation (Example 1)
@@ -247,26 +259,25 @@ function reqListener() {
247
259
};
248
260
```
249
261
250
-
## Labs
251
262
252
-
*[CORS vulnerability with basic origin reflection](https://portswigger.net/web-security/cors/lab-basic-origin-reflection-attack)
253
-
*[CORS vulnerability with trusted null origin](https://portswigger.net/web-security/cors/lab-null-origin-whitelisted-attack)
254
-
*[CORS vulnerability with trusted insecure protocols](https://portswigger.net/web-security/cors/lab-breaking-https-attack)
255
-
*[CORS vulnerability with internal network pivot attack](https://portswigger.net/web-security/cors/lab-internal-network-pivot-attack)
263
+
## Labs
256
264
257
-
## Bug Bounty reports
265
+
*[PortSwigger - CORS vulnerability with basic origin reflection](https://portswigger.net/web-security/cors/lab-basic-origin-reflection-attack)
266
+
*[PortSwigger - CORS vulnerability with trusted null origin](https://portswigger.net/web-security/cors/lab-null-origin-whitelisted-attack)
267
+
*[PortSwigger - CORS vulnerability with trusted insecure protocols](https://portswigger.net/web-security/cors/lab-breaking-https-attack)
268
+
*[PortSwigger - CORS vulnerability with internal network pivot attack](https://portswigger.net/web-security/cors/lab-internal-network-pivot-attack)
258
269
259
-
*[CORS Misconfiguration on www.zomato.com - James Kettle (albinowax)](https://hackerone.com/reports/168574)
-[Think Outside the Scope: Advanced CORS Exploitation Techniques - Ayoub Safa (Sandh0t) - May 14 2019](https://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397)
268
-
-[Exploiting CORS misconfigurations for Bitcoins and bounties - James Kettle - 14 October 2016](https://portswigger.net/blog/exploiting-cors-misconfigurations-for-bitcoins-and-bounties)
269
-
-[Exploiting Misconfigured CORS (Cross Origin Resource Sharing) - Geekboy - December 16, 2016](https://www.geekboy.ninja/blog/exploiting-misconfigured-cors-cross-origin-resource-sharing/)
-[Advanced CORS Exploitation Techniques - Corben Leo - June 16, 2018](https://web.archive.org/web/20190516052453/https://www.corben.io/advanced-cors-techniques/)
-[CORS Misconfiguration leading to Private Information Disclosure - sandh0t (sandh0t) - October 29, 2018](https://hackerone.com/reports/430249)
277
+
-[CORS Misconfiguration on www.zomato.com - James Kettle (albinowax) - September 15, 2016](https://hackerone.com/reports/168574)
278
+
-[CORS Misconfigurations Explained - Detectify Blog - Apr 26, 2018](https://blog.detectify.com/2018/04/26/cors-misconfigurations-explained/)
271
279
-[Cross-origin resource sharing (CORS) - PortSwigger Web Security Academy - December 30, 2019](https://portswigger.net/web-security/cors)
272
-
-[CORS Misconfigurations Explained - Detectify Blog - Apr 26, 2018](https://blog.detectify.com/2018/04/26/cors-misconfigurations-explained/)
280
+
-[Cross-origin resource sharing misconfig | steal user information - bughunterboy (bughunterboy) - June 1, 2017](https://hackerone.com/reports/235200)
281
+
-[Exploiting CORS misconfigurations for Bitcoins and bounties - James Kettle - 14 October 2016](https://portswigger.net/blog/exploiting-cors-misconfigurations-for-bitcoins-and-bounties)
282
+
-[Exploiting Misconfigured CORS (Cross Origin Resource Sharing) - Geekboy - December 16, 2016](https://www.geekboy.ninja/blog/exploiting-misconfigured-cors-cross-origin-resource-sharing/)
283
+
-[Think Outside the Scope: Advanced CORS Exploitation Techniques - Ayoub Safa (Sandh0t) - May 14 2019](https://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397)
Copy file name to clipboardexpand all lines: CVE Exploits/README.md
+25-4
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,21 @@
1
1
# Common Vulnerabilities and Exposures
2
2
3
+
A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a publicly known cybersecurity vulnerability. CVEs help standardize the naming and tracking of vulnerabilities, making it easier for organizations, security professionals, and software vendors to share information and manage risks associated with these vulnerabilities. Each CVE entry includes a brief description of the vulnerability, its potential impact, and details about affected software or systems.
4
+
5
+
## Summary
6
+
7
+
*[Tools](#tools)
8
+
*[Big CVEs in the last 15 years](#big-cves-in-the-last-15-years)
-[Trickest CVE Repository - Automated collection of CVEs and PoC's](https://github.com/trickest/cve)
@@ -8,7 +24,7 @@
8
24
-[CVE Details - The ultimate security vulnerability datasource](https://www.cvedetails.com)
9
25
10
26
11
-
## Big CVEs in the last 5 years.
27
+
## Big CVEs in the last 15 years
12
28
13
29
### CVE-2017-0144 - EternalBlue
14
30
@@ -24,19 +40,23 @@ Afftected systems:
24
40
- Windows 10 Gold, 1511, and 1607
25
41
- Windows Server 2016
26
42
43
+
27
44
### CVE-2017-5638 - Apache Struts 2
28
45
29
46
On March 6th, a new remote code execution (RCE) vulnerability in Apache Struts 2 was made public. This recent vulnerability, CVE-2017-5638, allows a remote attacker to inject operating system commands into a web application through the “Content-Type” header.
30
47
48
+
31
49
### CVE-2018-7600 - Drupalgeddon 2
32
50
33
51
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised.
34
52
53
+
35
54
### CVE-2019-0708 - BlueKeep
36
55
37
56
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
38
57
39
-
### CVE-2019-19781 - Citrix ADC Netscaler
58
+
59
+
### CVE-2019-19781 - Citrix ADC Netscaler
40
60
41
61
A remote code execution vulnerability in Citrix Application Delivery Controller (ADC) formerly known as NetScaler ADC and Citrix Gateway formerly known as NetScaler Gateway that, if exploited, could allow an unauthenticated attacker to perform arbitrary code execution.
42
62
@@ -47,12 +67,12 @@ Affected products:
47
67
- Citrix ADC and NetScaler Gateway version 11.1 all supported builds
48
68
- Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds
49
69
50
-
## Older, but not forgotten
51
70
52
71
### CVE-2014-0160 - Heartbleed
53
72
54
73
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
55
74
75
+
56
76
### CVE-2014-6271 - Shellshock
57
77
58
78
Shellshock, also known as Bashdoor is a family of security bug in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.
Copy file name to clipboardexpand all lines: Clickjacking/README.md
+5-8
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,6 @@
1
1
# Clickjacking
2
2
3
-
> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives,
4
-
> potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions
5
-
> as such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions
6
-
> that a normal user can do on a legitimate website can be done using clickjacking.
3
+
> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions as such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions that a normal user can do on a legitimate website can be done using clickjacking.
Determine the Clickjacking vulnerability within this code snippet. Identify how the hidden iframe is being used to exploit the user's actions when they click the button, leading them to a malicious website.
*[Client Side Clickjacking Test](https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/11-Client_Side_Testing/09-Testing_for_Clickjacking)
232
+
*[OWASP Client Side Clickjacking Test](https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/11-Client_Side_Testing/09-Testing_for_Clickjacking)
Copy file name to clipboardexpand all lines: Client Side Path Traversal/README.md
+12-9
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,18 @@
1
1
# Client Side Path Traversal
2
2
3
-
Client-Side Path Traversal (CSPT), sometimes also referred to as "On-site Request Forgery," is a vulnerability that can be exploited as a tool for CSRF or XSS attacks.
4
-
It takes advantage of the client side's ability to make requests using fetch to a URL, where multiple "../" characters can be injected. After normalization, these characters redirect the request to a different URL, potentially leading to security breaches.
5
-
Since every request is initiated from within the frontend of the application, the browser automatically includes cookies and other authentication mechanisms, making them available for exploitation in these attacks.
3
+
> Client-Side Path Traversal (CSPT), sometimes also referred to as "On-site Request Forgery," is a vulnerability that can be exploited as a tool for CSRF or XSS attacks.
4
+
5
+
> It takes advantage of the client side's ability to make requests using fetch to a URL, where multiple "../" characters can be injected. After normalization, these characters redirect the request to a different URL, potentially leading to security breaches.
6
+
7
+
> Since every request is initiated from within the frontend of the application, the browser automatically includes cookies and other authentication mechanisms, making them available for exploitation in these attacks.
8
+
6
9
7
10
## Summary
8
11
9
12
*[Tools](#tools)
10
-
*[Lab](#lab)
11
13
*[CSPT to XSS](#cspt-to-xss)
12
14
*[CSPT to CSRF](#cspt-to-xss)
15
+
*[Labs](#labs)
13
16
*[References](#references)
14
17
15
18
@@ -18,11 +21,6 @@ Since every request is initiated from within the frontend of the application, th
18
21
*[doyensec/CSPTBurpExtension](https://github.com/doyensec/CSPTBurpExtension) - CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.
19
22
20
23
21
-
## Lab
22
-
23
-
*[doyensec/CSPTPlayground](https://github.com/doyensec/CSPTPlayground) - CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
*[CVE-2023-5123 : CSPT2CSRF in Grafana’s JSON API Plugin](https://medium.com/@maxime.escourbiac/grafana-cve-2023-5123-write-up-74e1be7ef652)
62
60
63
61
62
+
## Labs
63
+
64
+
*[doyensec/CSPTPlayground](https://github.com/doyensec/CSPTPlayground) - CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
0 commit comments