Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Exploit security holes filter_list
Author
Message
Exploit security holes #1
I scanned an onion address for security holes using Burp Suite.

Burp Suite gave me the following vulnerabilities:

1. SQL injection

[fullname parameter]
[street parameter]

2. Cross-site scripting (stored)

3. Cross-site scripting (reflected)

3.1. [info parameter]

3.2. [info parameter]

3.3. [info parameter]

4. Cookie without HttpOnly flag set

5. Unencrypted communications

6. Path-relative style sheet import

7. Cross-site request forgery

8. External service interaction (DNS)

8.1. [fullname parameter]

9. External service interaction (SMTP)

10. Spoofable client IP address

11. Input returned in response (reflected)

11.1. [city parameter]

11.2. [country parameter]

11.3. [email parameter]

11.4. [fullname parameter]

11.5. [info parameter]

11.6. [notes%5B%5D parameter]

11.7. [shipping parameter]

11.8. [state parameter]

11.9. [street parameter]

11.10. [zip parameter]

11.11. [city parameter]

11.12. [country parameter]

11.13. [email parameter]

11.14. [fullname parameter]

11.15. [info parameter]

11.16. [notes%5B%5D parameter]

11.17. [shipping parameter]

11.18. [state parameter]

11.19. [street parameter]

11.20. [zip parameter]

11.21. [city parameter]

11.22. [country parameter]

11.23. [email parameter]

11.24. [fullname parameter]

11.25. [info parameter]

11.26. [notes%5B%5D parameter]

11.27. [shipping parameter]

11.28. [state parameter]

11.29. [street parameter]

11.30. [zip parameter]

11.31. [city parameter]

11.32. [country parameter]

11.33. [email parameter]

11.34. [fullname parameter]

11.35. [info parameter]

11.36. [notes%5B%5D parameter]

11.37. [shipping parameter]

11.38. [state parameter]

11.39. [street parameter]

11.40. [zip parameter]

12. Suspicious input transformation (reflected)

12.1. [city parameter]

12.2. [country parameter]

12.3. [email parameter]

12.4. [fullname parameter]

12.5. [info parameter]

12.6. [shipping parameter]

12.7. [state parameter]

12.8. [street parameter]

12.9. [zip parameter]

12.10. [city parameter]

12.11. [country parameter]

12.12. [email parameter]

12.13. [fullname parameter]

12.14. [info parameter]

12.15. [shipping parameter]

12.16. [state parameter]

12.17. [street parameter]

12.18. [zip parameter]

12.19. [city parameter]

12.20. [country parameter]

12.21. [email parameter]

12.22. [fullname parameter]

12.23. [info parameter]

12.24. [shipping parameter]

12.25. [state parameter]

12.26. [street parameter]

12.27. [zip parameter]

13. Cross-domain Referer leakage

14. Frameable response (potential Clickjacking)

15. Link manipulation (reflected)

15.1. [language-switcher parameter]

15.2. [language-switcher parameter]

15.3. [name of an arbitrarily supplied URL parameter]

15.4. [language-switcher parameter]

15.5. [name of an arbitrarily supplied URL parameter]

15.6. [language-switcher parameter]

15.7. [name of an arbitrarily supplied URL parameter]

15.8. [language-switcher parameter]

15.9. [name of an arbitrarily supplied URL parameter]

15.10. [language-switcher parameter]

15.11. [name of an arbitrarily supplied URL parameter]

15.12. [language-switcher parameter]

15.13. [name of an arbitrarily supplied URL parameter]

15.14. [language-switcher parameter]

15.15. [name of an arbitrarily supplied URL parameter]

15.16. [language-switcher parameter]

15.17. [name of an arbitrarily supplied URL parameter]

15.18. [language-switcher parameter]

15.19. [name of an arbitrarily supplied URL parameter]

15.20. [language-switcher parameter]

15.21. [name of an arbitrarily supplied URL parameter]

15.22. [language-switcher parameter]

15.23. [name of an arbitrarily supplied URL parameter]

15.24. [language-switcher parameter]

15.25. [name of an arbitrarily supplied URL parameter]

15.26. [language-switcher parameter]

15.27. [name of an arbitrarily supplied URL parameter]

15.28. [language-switcher parameter]

15.29. [name of an arbitrarily supplied URL parameter]

15.30. [language-switcher parameter]

15.31. [name of an arbitrarily supplied URL parameter]

16. Email addresses disclosed

Can anyone tell me how to read the database now?
I have not found any really helpful tutorials on this.

Reply







Users browsing this thread: 1 Guest(s)