Think Fast: How Auto-Complete Suggested Me Passwords That Weren’t Mine ᾒf
作者通过工具发现一个配置错误的表单和GraphQL端点,导致浏览器泄露其他用户的密码。 2025-8-9 05:33:25 Author: infosecwriteups.com(查看原文) 阅读量:67 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by Perplexity AI

_”I just wanted to book a cab. Ended up almost unlocking someone else’s account. Thanks, autofill.”_

You ever sit at your desk with a plate of noodles, Netflix on the second monitor, and Burp Suite humming like it knows you’re about to hit paydirt? Yeah, that was me. One hand on the fork, the other CTRL+Shift+I-ing through a bug bounty target. Little did I know, a forgotten <input> field would cough up passwords like an over-sharer on truth serum.

Let’s dive into how one misconfigured form, a forgotten GraphQL endpoint, and a very talkative browser nearly handed me other users’ passwords on a silver platter.

It all started with a pretty simple goal: mass recon.

I used a combo of tools like:

  • Subfinder + Amass for subdomain enumeration
  • httpx for probing alive hosts

文章来源: https://infosecwriteups.com/think-fast-how-auto-complete-suggested-me-passwords-that-werent-mine-%E1%BE%92f-d5c26ad34a3a?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh