当前位置:网站首页>Record once, modify password logic vulnerability actual combat
Record once, modify password logic vulnerability actual combat
2022-07-06 14:03:00 【Lazy and talented】
Catalog
0x0a Status code information :
0x0b The nature of the vulnerability :
0x0c Information gathering : js White box
0x02 Intercept the return packet , Modify the status code
It is found that Prompt process error
0x05 Log in with the new password Successfully logged in
The vulnerability has been fixed , Do not operate carelessly .
0x0a Status code information :
HTTP Status code from Three decimal digits make up
There are five types of responses : Information response (100–199), Successful response (200–299), Redirect (300–399),
Client error (400–499) And server errors (500–599).
0x0b The nature of the vulnerability :
Lack of back-end authentication or server authentication , And the front end lacks logic .
0x0c Information gathering : js White box
vue frame , miscellaneous webpack, Infer the use of js Front end validation .
f12 see ctrl+f Search for logical vulnerability keywords “ Verify success ”
Combine the front , There may be a single front-end certification
Ideas : Grab the bag , modify response Status code for :200
0x0d Don't talk much, do it
0x01 Verification code bypass
Note that the verification code is not obtained at this time
0x02 Intercept the return packet , Modify the status code
do intercept ——> Response to this request
Modify the status code to 200
Verification code bypassed successfully
0x03 Modify reset password
0x00 It is found that Prompt process error
f12 View source code
I found that there are still js authentication , Because the last step may lack js Parameters
That's it Try whether you can bypass here
0x04 Modify the status code
Successfully bypassed
0x05 Log in with the new password Successfully logged in
The vulnerability has been fixed , Do not operate carelessly .
边栏推荐
- 4. Branch statements and loop statements
- HackMyvm靶机系列(5)-warez
- Difference and understanding between detected and non detected anomalies
- QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
- js判断对象是否是数组的几种方式
- 7-15 h0161. Find the greatest common divisor and the least common multiple (PTA program design)
- 实验九 输入输出流(节选)
- MATLAB打开.m文件乱码解决办法
- Miscellaneous talk on May 14
- Attach the simplified sample database to the SQLSERVER database instance
猜你喜欢
【VMware异常问题】问题分析&解决办法
Using spacedesk to realize any device in the LAN as a computer expansion screen
7-7 7003 combination lock (PTA program design)
Strengthen basic learning records
. Net6: develop modern 3D industrial software based on WPF (2)
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
【黑马早报】上海市监局回应钟薛高烧不化;麦趣尔承认两批次纯牛奶不合格;微信内测一个手机可注册俩号;度小满回应存款变理财产品...
Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
Hackmyvm target series (6) -videoclub
2. First knowledge of C language (2)
随机推荐
Relationship between hashcode() and equals()
7-3 construction hash table (PTA program design)
Miscellaneous talk on May 14
Nuxtjs快速上手(Nuxt2)
Canvas foundation 2 - arc - draw arc
Brief introduction to XHR - basic use of XHR
Hackmyvm target series (7) -tron
强化学习基础记录
强化学习基础记录
使用Spacedesk实现局域网内任意设备作为电脑拓展屏
Hackmyvm target series (4) -vulny
xray与burp联动 挖掘
About the parental delegation mechanism and the process of class loading
记一次api接口SQL注入实战
7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
Strengthen basic learning records
浅谈漏洞发现思路
js判断对象是否是数组的几种方式
Simply understand the promise of ES6
HackMyvm靶机系列(7)-Tron