How I ‘Hacked’ NASA Without Going to Jail
Antonio Rivera是一名安全研究员和道德黑客。他通过手动测试和探测发现NASA子域名vuln.nasa.gov中的注入漏洞,并成功利用单引号payload触发调试模式,暴露内部配置信息。该漏洞从报告到修复耗时近两个月,并最终获得NASA的感谢信。 2025-9-20 00:45:53 Author: infosecwriteups.com(查看原文) 阅读量:2 收藏

Antonio Rivera Poblete

How you can too…

Hi, I’m Antonio Rivera, a Security Researcher, Bug Hunter, and Ethical Hacker. I have secured some companies, received bounties, Hall of Fame mentions and recived Letters of Appreciation and Recognition.

Press enter or click to view image in full size

🌌 Hacking NASA — A Journey Full of Challenges

Let me tell you — hacking NASA (ethically, of course!) isn’t something that happens overnight. This achievement was the result of continuous effort, learning, and bug hunting on their platform.

🔍 Now the Actual Thing: The Vulnerability I Found

I was prowling a subdomain something like vuln.nasa.gov poking at it the old-fashioned way: manual tests, small probes, looking for IDORs, CSTI, XSS and the usual suspects.

I clicked into a calendar form just to see what it would do. Nothing flashy: a date picker, a few fields, the kind of UI people build and forget about. I decided to be petty and inject the simplest thing possible a single-quote payload: ' Immediately, the site crashed.

Not a graceful error page, not a polite “something went wrong” an ugly Django traceback appeared. Debug mode was on. The stack trace spilled internal configuration and environment details that should never leave to the public.

In short, a development convenience had become an open door.

Press enter or click to view image in full size

📅 Timeline of the Report

Submitted : 08 Apr 2025
Triaged: 13 Apr 2025
Resolved: 22 May 2025 ✅
LoR: 11 Jun 2025 🎉

The LOR😊:

Press enter or click to view image in full size

How to do it:

Press enter or click to view image in full size


文章来源: https://infosecwriteups.com/how-did-i-hacked-nasa-without-go-to-the-jail-4bf0eebc934b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh