Logs Don’t Lie: How a GraphQL Debug Endpoint Spilled the Entire Database ️
从一杯咖啡开始,安全研究人员通过GraphQL调试端点入侵系统,意外发现debug-api.target.com子域名并获取整个数据库。 2025-8-12 06:6:40 Author: infosecwriteups.com(查看原文) 阅读量:25 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

It all started with coffee.
Like every bug hunter, I told myself “I’ll just check one more domain before bed”… and then it was 4:37 AM, I had 37 Chrome tabs open, my coffee was cold, and my cat was giving me that “go to sleep, you idiot” stare. 🐈

But what I stumbled upon that night was worth every drop of caffeine-induced anxiety.
Let me take you through how a seemingly harmless GraphQL debug endpoint decided to go full drama mode and hand me their entire database.

I was running my usual recon workflow:

subfinder -d target.com -silent | httpx -silent -mc 200

One subdomain stood out:

debug-api.target.com

文章来源: https://infosecwriteups.com/logs-dont-lie-how-a-graphql-debug-endpoint-spilled-the-entire-database-%EF%B8%8F-a4b859ec6a1c?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh