当前位置:网站首页>Record once, modify password logic vulnerability actual combat
Record once, modify password logic vulnerability actual combat
2022-07-06 14:03:00 【Lazy and talented】
Catalog
0x0a Status code information :
0x0b The nature of the vulnerability :
0x0c Information gathering : js White box
0x02 Intercept the return packet , Modify the status code
It is found that Prompt process error
0x05 Log in with the new password Successfully logged in
The vulnerability has been fixed , Do not operate carelessly .
0x0a Status code information :
HTTP Status code from Three decimal digits make up
There are five types of responses : Information response (100–199), Successful response (200–299), Redirect (300–399),
Client error (400–499) And server errors (500–599).
0x0b The nature of the vulnerability :
Lack of back-end authentication or server authentication , And the front end lacks logic .
0x0c Information gathering : js White box

vue frame , miscellaneous webpack, Infer the use of js Front end validation .
f12 see ctrl+f Search for logical vulnerability keywords “ Verify success ”

Combine the front , There may be a single front-end certification
Ideas : Grab the bag , modify response Status code for :200
0x0d Don't talk much, do it
0x01 Verification code bypass

Note that the verification code is not obtained at this time
0x02 Intercept the return packet , Modify the status code

do intercept ——> Response to this request

Modify the status code to 200

Verification code bypassed successfully
0x03 Modify reset password

0x00 It is found that Prompt process error
f12 View source code 
I found that there are still js authentication , Because the last step may lack js Parameters
That's it Try whether you can bypass here
0x04 Modify the status code

Successfully bypassed
0x05 Log in with the new password Successfully logged in

The vulnerability has been fixed , Do not operate carelessly .
边栏推荐
- Record a penetration of the cat shed from outside to inside. Library operation extraction flag
- canvas基础2 - arc - 画弧线
- Experiment 8 exception handling
- 7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
- [MySQL database learning]
- Reinforcement learning series (I): basic principles and concepts
- 浅谈漏洞发现思路
- Middleware vulnerability recurrence Apache
- 2022泰迪杯数据挖掘挑战赛C题思路及赛后总结
- 【数据库 三大范式】一看就懂
猜你喜欢

Hackmyvm target series (3) -visions

Yugu p1012 spelling +p1019 word Solitaire (string)

中间件漏洞复现—apache

1. First knowledge of C language (1)

FAQs and answers to the imitation Niuke technology blog project (I)

HackMyvm靶机系列(4)-vulny

网络层—简单的arp断网

Nuxtjs快速上手(Nuxt2)

How to understand the difference between technical thinking and business thinking in Bi?

Interpretation of iterator related "itertools" module usage
随机推荐
Miscellaneous talk on May 27
7-9 make house number 3.0 (PTA program design)
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
4. Branch statements and loop statements
Attach the simplified sample database to the SQLSERVER database instance
网络层—简单的arp断网
Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
xray与burp联动 挖掘
Canvas foundation 1 - draw a straight line (easy to understand)
Record a penetration of the cat shed from outside to inside. Library operation extraction flag
实验五 类和对象
. How to upload XMIND files to Jinshan document sharing online editing?
Callback function ----------- callback
强化學習基礎記錄
渗透测试学习与实战阶段分析
Nuxtjs quick start (nuxt2)
HackMyvm靶机系列(2)-warrior
[dark horse morning post] Shanghai Municipal Bureau of supervision responded that Zhong Xue had a high fever and did not melt; Michael admitted that two batches of pure milk were unqualified; Wechat i
7-14 错误票据(PTA程序设计)
7-3 构造散列表(PTA程序设计)