Bounty $3000 http request smuggling in twitter.com of

Поділитися
Вставка
  • Опубліковано 9 лис 2024

КОМЕНТАРІ • 36

  • @dexiios
    @dexiios Рік тому +32

    For those who ask what is the potential impact of this vuln : an attacker can inject a malicious HTTP request into the web server in order to bypass internal security controls. The point is that, most of the time, the web servers do not check for security mesures in a smuggled http request. In addition, some of the ressources available on the web server are often not accessible outsite of the web server itself. So performing a request like this can allow the attacker to gain access to protected ressources such as admin panel etc...

  • @abdulx01
    @abdulx01 Рік тому +4

    Nice catch... 👍

  • @shba9300
    @shba9300 Рік тому +4

    Dear good find
    Would like to know how would you convince them it's a vulnerability and what is the impact

    • @joshuavega2193
      @joshuavega2193 Рік тому +6

      Since the tweet is not made in another account, I guess that´s why the bug got only 3k. If it had been a tweet in a different account, it would've gotten a higher bounty. Remember that this is not directly for vulnerabilities, but for bugs too. I guess that's why it's called "Bug Bounty" and not "Vulnerability Hunting".

    • @theworldofyuri3083
      @theworldofyuri3083 Рік тому

      @@joshuavega2193 nice reminder heheh

    • @oo7posam581
      @oo7posam581 Рік тому +2

      ​@@joshuavega2193 He should have gone for Ssrf through this... Server would have accepted the 1st request as original and yet answered the second request as valid.

  • @bharathkalyan3961
    @bharathkalyan3961 Рік тому

    Great Finding

  • @youssefzero9059
    @youssefzero9059 Рік тому +4

    ❣❣

  • @DreyTheVlogger
    @DreyTheVlogger Рік тому

    Hello, what background music did you used ?
    Thanks!

  • @cx3622
    @cx3622 Місяць тому

    No idea why they awarded you 3k for this lol. The 2nd request would still be posted successfully even without the first one.

  • @electrowizard2658
    @electrowizard2658 Рік тому +2

    thier can be no affect on this its just ur forwaring the tweet request with some changes

    • @umarsjd7205
      @umarsjd7205 4 місяці тому

      Actually it has. The person didnt showed this but what he was trying to depict is How vulnerable the security is, The person could insert malicious request To weaken the security which already is.like he can insert JavaScript or injections to ask for Passwords from the system cuz he already infiltrated it

  • @vmvideos8482
    @vmvideos8482 Рік тому +3

    Bro how to install the burp suite version 1.7.35 ?

    • @educationhive
      @educationhive  Рік тому +1

      I will send there if I send here yt can strike

  • @allandiego1446
    @allandiego1446 Рік тому

    Dear good!
    But which is the really impact of this vulnerability?

  • @AGNIHACKERS
    @AGNIHACKERS Рік тому +3

    Bro please share Reference report

    • @educationhive
      @educationhive  Рік тому +1

      Ok I Will share next video

    • @AGNIHACKERS
      @AGNIHACKERS Рік тому +2

      @@educationhive bro please mention this report link. Same Model vulnerability i find in other website.

    • @educationhive
      @educationhive  Рік тому +1

      @@AGNIHACKERS sure

  • @AL-dg3qd
    @AL-dg3qd Рік тому +2

    what tool do you use to find out if it's xss?

  • @UCgqz30RWVkz5yowONnFrO4w
    @UCgqz30RWVkz5yowONnFrO4w Рік тому +3

    Bro can you explain, what is the Impact. Because you are tweeting another tweet from the same account. I am new to this vulnerability and many times I found this vuln but not able to show Impact and no-one will accept it wihout any serious impact. Pls explain the impact.

    • @educationhive
      @educationhive  Рік тому +1

      I will explain here at night

    • @the_sandman00
      @the_sandman00 Рік тому +8

      @@educationhiveis it night yet?

    • @newbiejember9854
      @newbiejember9854 Рік тому +2

      @@the_sandman00 xD

    • @user3549
      @user3549 11 місяців тому

      Lol​@@newbiejember9854

    • @jondo-vh8tx
      @jondo-vh8tx 7 місяців тому +1

      @@the_sandman00 😂😂😂😂😂😂😂😂😂😂 no dude he will not explain and this is waste of time

  • @AutomatizaTuTiempo
    @AutomatizaTuTiempo Рік тому +4

    hey that's not a vulnerability

    • @joshuavega2193
      @joshuavega2193 Рік тому +1

      Since the tweet is not made in another account, I guess that´s why the bug got only 3k. If it had been a tweet in a different account, it would've gotten a higher bounty. Remember that this is not directly for vulnerabilities, but for bugs too. I guess that's why it's called "Bug Bounty" and not "Vulnerability Hunting".

    • @AutomatizaTuTiempo
      @AutomatizaTuTiempo Рік тому +1

      @@joshuavega2193 For simple mistakes you don't get rewards, plus the staff ignores it.

    • @brice2825
      @brice2825 Рік тому +2

      The request might be bypassing front-end server