A very easy bug anyone can find and ignored by many bug bounty hunters
作者测试私有程序时发现一博客订阅表单,尝试注入HTML和SSTIayload,部分字符被移除。再次尝试简单超链接成功注入。 2025-9-10 06:3:39 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Be nice insabat

Hello readers how are you, i hope all of you are doing great.

I am back with another writeup for the community:

I was just searching for private programs for hyperlink injection on google after choosing a random program i was just click on blog then will reached at https://target.com/blog

scroll down and see that there was a submit form having name and email field with the help of that we can subscribe to the platform for new blog posts notifications, then i immidiately injected html and ssti payload

{{8*8}}/”><A HREF=bing.com>HELLO</A”>

in name field and my email in email field then “click keep me updated button” yes i received an email but some malicious characters removed from the payload and some were cached as it is

Press enter or click to view image in full size

then i again went to submit form and injected simple hyper link payload like “ sign in here evil.com and get 100$ bonus” in name field and click the submit button and went to my inbox and my hyper link was successfully injected

Press enter or click to view image in full size

I was surprised, but not 100% sure about bounty or acceptance of bug, because some programs dont take serious this bug, i was…


文章来源: https://infosecwriteups.com/a-very-easy-bug-anyone-can-find-8d2b11a768c7?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh