SSTI POC || ycode.com Bug Bounty scam

  Рет қаралды 348

A9x

A9x

14 күн бұрын

#hacker #bug #bugbounty

Пікірлер: 11
@akroidofficial
@akroidofficial 3 күн бұрын
why you gave title bug bounty scam?
@sukremez1870
@sukremez1870 6 күн бұрын
how did you find it that the url can do &service?
@A9x-AkhilReddy
@A9x-AkhilReddy 6 күн бұрын
@@sukremez1870 I got you back . If you test any application you just gather info about the technology they used . Then you are testing like hit and trail . Everything about the website you have to test for different aspects in a different manner .if you don't know where you want to test.you just read the documentation of the website you are testing . It would help you what endpoint and what was the details fetch from backend to front end simple how it is working . And that was the phase where I discovered the first name and second name is vulnerable to SSTI.then I check what was they used template to process the data .then I got to know it was Jinja2 instances template is used . Then I tried a simple payload. And it worked . Then I dig deep to escalate into RCE. I hope I just clear your question
@sukremez1870
@sukremez1870 5 күн бұрын
@@A9x-AkhilReddy aight got it
@gk_eth
@gk_eth 12 күн бұрын
did you submitted the impact?
@A9x-AkhilReddy
@A9x-AkhilReddy 12 күн бұрын
@@gk_eth I show a simple payload in this poc . I cut the interesting part I escalate into RCE
@sukremez1870
@sukremez1870 6 күн бұрын
@@A9x-AkhilReddy if rce, got bounty then? if yes, does this website have bounty program in hackerone/bugcrowd? or no?
@user-mo8uj9vq5u
@user-mo8uj9vq5u 21 сағат бұрын
yes indeed that math is being evaluated and I can tell this is a legit ssti how that turn out for you and are you open to collab?
@A9x-AkhilReddy
@A9x-AkhilReddy 16 сағат бұрын
@@user-mo8uj9vq5u thanks for the Collab request. I escalate into RCE for jinja2 instances I cut the part and just uploaded. If I got anything I will Collab . Try to drop the social media link to contact you . Any way they scammed me for not getting any response from their side.
@user-mo8uj9vq5u
@user-mo8uj9vq5u 15 сағат бұрын
@@A9x-AkhilReddy u have twitter ill add u
Пробую самое сладкое вещество во Вселенной
00:41
МАМА И STANDOFF 2 😳 !FAKE GUN! #shorts
00:34
INNA SERG
Рет қаралды 4,9 МЛН
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 33 МЛН
HACKING GraphQL FOR BEGINNERS + GIVEAWAY (closed)
8:58
Farah Hawa
Рет қаралды 35 М.
Cross-Site Scripting (XSS) Explained! // How to Bug Bounty
14:43
Cross Site Scripting (XSS) | Real World
6:17
Ryan John
Рет қаралды 43 М.
BUG BOUNTY TIPS: FINDING ENDPOINTS |  2023
10:49
BePractical
Рет қаралды 7 М.
I legally defaced this website.
25:48
thehackerish
Рет қаралды 506 М.
How To Pick Your Targets // How To Bug Bounty
10:19
NahamSec
Рет қаралды 16 М.
Every FREE Resource You Need To Become A Bug Bounty Hunter
9:31
Пробую самое сладкое вещество во Вселенной
00:41