当前位置:网站首页>Record once, modify password logic vulnerability actual combat
Record once, modify password logic vulnerability actual combat
2022-07-06 14:03:00 【Lazy and talented】
Catalog
0x0a Status code information :
0x0b The nature of the vulnerability :
0x0c Information gathering : js White box
0x02 Intercept the return packet , Modify the status code
It is found that Prompt process error
0x05 Log in with the new password Successfully logged in
The vulnerability has been fixed , Do not operate carelessly .
0x0a Status code information :
HTTP Status code from Three decimal digits make up
There are five types of responses : Information response (100–199), Successful response (200–299), Redirect (300–399),
Client error (400–499) And server errors (500–599).
0x0b The nature of the vulnerability :
Lack of back-end authentication or server authentication , And the front end lacks logic .
0x0c Information gathering : js White box
vue frame , miscellaneous webpack, Infer the use of js Front end validation .
f12 see ctrl+f Search for logical vulnerability keywords “ Verify success ”
Combine the front , There may be a single front-end certification
Ideas : Grab the bag , modify response Status code for :200
0x0d Don't talk much, do it
0x01 Verification code bypass
Note that the verification code is not obtained at this time
0x02 Intercept the return packet , Modify the status code
do intercept ——> Response to this request
Modify the status code to 200
Verification code bypassed successfully
0x03 Modify reset password
0x00 It is found that Prompt process error
f12 View source code
I found that there are still js authentication , Because the last step may lack js Parameters
That's it Try whether you can bypass here
0x04 Modify the status code
Successfully bypassed
0x05 Log in with the new password Successfully logged in
The vulnerability has been fixed , Do not operate carelessly .
边栏推荐
- 【Numpy和Pytorch的数据处理】
- A piece of music composed by buzzer (Chengdu)
- 中间件漏洞复现—apache
- Detailed explanation of redis' distributed lock principle
- 强化學習基礎記錄
- Programme de jeu de cartes - confrontation homme - machine
- 【头歌educoder数据表中数据的插入、修改和删除】
- Hackmyvm target series (3) -visions
- Analysis of penetration test learning and actual combat stage
- Package bedding of components
猜你喜欢
2022 Teddy cup data mining challenge question C idea and post game summary
强化学习基础记录
HackMyvm靶机系列(4)-vulny
7-5 走楼梯升级版(PTA程序设计)
Strengthen basic learning records
HackMyvm靶机系列(5)-warez
Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
4. Branch statements and loop statements
Hackmyvm target series (3) -visions
canvas基础2 - arc - 画弧线
随机推荐
深度强化文献阅读系列(一):Courier routing and assignment for food delivery service using reinforcement learning
Middleware vulnerability recurrence Apache
Beautified table style
.Xmind文件如何上传金山文档共享在线编辑?
7-8 7104 约瑟夫问题(PTA程序设计)
The United States has repeatedly revealed that the yield of interest rate hiked treasury bonds continued to rise
Force deduction 152 question multiplier maximum subarray
强化學習基礎記錄
Matlab opens M file garbled solution
How to understand the difference between technical thinking and business thinking in Bi?
Which is more advantageous in short-term or long-term spot gold investment?
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
Implementation of count (*) in MySQL
7-4 散列表查找(PTA程序设计)
【MySQL数据库的学习】
Hackmyvm target series (5) -warez
Why use redis
Meituan dynamic thread pool practice ideas, open source
【Numpy和Pytorch的数据处理】
Hackmyvm target series (3) -visions