How to Identify Some of the Easiest P4 Bugs 🐞✨
3 min readDec 2, 2024
Exif Geo Location
- Visit example.com
- Go to the Upload option on the website
- Upload the image with EXIF metadata.
- Please right-click on the image and download it.
- Visit https://jimpl.com
- Upload the downloaded image and check for sensitive data.
Broken authentication — Failure to invalidate session on logout
- Go to the URL — example.com
- Open the same account on two different tabs on the same browser — Browser A
- Click on the Logout from one tab — TAB A
- Once the session is terminated, go to the second tab (TAB B) update some data, and save it
- After changing the data, click on the refresh button.
- The data will be updated.
No rate limit on reports for other user comments
- Visit page https://example.com/blog/page4/report-comment?comment_id=33
- Report this comment and capture the request in Burpsuite
- Send this request in burp suite intruder and start the attack
- After a few minutes, the user comment was deleted
Email Verification Bypass
- Unprotected Account Activation URLs — example.com/verify?user_id=1234
- Predictable Verification Tokens — example.com/verify?token=abcd1234
- Bypassing Verification Status Checks — “is_varified: false”
- Direct Access to the Verified User Area -** /dashboard or /profile**
- Verification email hijacking
Content Spoofing/Test Injection/External Authentication Injection
- Go to example.com
- Then just change the above URL like this https://example.com/wp-login.php?error=access_denied to https://example.com/wp-login.php?error=you are hacked
- Click enter and the message got reflected on the page.
Failure to invalidate session — On the password reset/change
- Create an account on https://site.com
- Login using credentials in 2 browsers
- Open the profile/settings.
- Go to Change password and change the password in Browser 1
- Visit Browser 2 and edit the profile data (name/contact no/profile picture) and click on save.
- Refresh the page once and the data will be changed
Delete Account Without Password
- Visit the website and log into your account.
- Go to the profile/settings section.
- A delete account button will be displayed.
- Click on the delete button and your account is successfully deleted.
SPF and DMARC Record
For SPF
- Visit — https://www.kitterman.com/spf/validate.html
- Enter the domain name — target.com and hit Get SPF Record
- The domain name will show No valid SPF record found
For DMARC
- Visit — https://mxtoolbox.com
- Enter the domain name — target.com and hit go
- The domain name will show No DMARC Record found
Broken Link Hijacking
- Open the link https://www.website.com
- Click on the social media icons like — Twitter / Facebook / Instagram, etc.
- If not the account will not be made, it will return — PAGE NOT FOUND or ACCOUNT NOT FOUND
- The attacker can create an account by the company’s name.
Clickjacking
- Open the site.com and go to the profile/account/settings page
- Copy the profile URL and paste it on the clickjacking exploit and save it
- Open the clickjacking file and the target.com will be vulnerable to Clickjacking and load successfully into the iframe of the attacker
- The attacker can perform a sensitive action
The token is invalidated after use
- Open the URL https://site.com
- Go to Forgot password page
- Enter your email ID and you will receive a reset link
- Change the password multiple times using the same reset link
- The password gets changed every time.
HTTP by default
- Open the domain — http://site.com
- Copy the URL and open a new tab
- Paste the URL and add a “S” in the domain
- If the URL not open on https then it’s vulnerable
Improper Cache-Control
- Open the URL in your browser https://example.com
- Login using the desired credentials
- Open any sensitive page like (account/settings/profile )
- Click on the signout button
- Press the back button of the browser
- User’s sensitive information will be visible on the page
Weak Registration Implementation
- Open this URL in the browser — example.com/signup
- An account verification link will be sent
- Go to your email inbox and open the email
- Right-click on the link and copy the link
- Paste the link in notepad/browser and check if it is on HTTP
- Press enter and check if the account is opened or not.
Weak Password Reset Implementation
- Go to forgot password page
- Enter the registered email
- Go to the email inbox
- Right-click on the box and copy the link
- Paste the link in the browser
- Check if the link is on HTTP
#HappyHacking