Exploit security holes 06-11-2023, 01:09 AM
#1
I scanned an onion address for security holes using Burp Suite.
Burp Suite gave me the following vulnerabilities:
1. SQL injection
[fullname parameter]
[street parameter]
2. Cross-site scripting (stored)
3. Cross-site scripting (reflected)
3.1. [info parameter]
3.2. [info parameter]
3.3. [info parameter]
4. Cookie without HttpOnly flag set
5. Unencrypted communications
6. Path-relative style sheet import
7. Cross-site request forgery
8. External service interaction (DNS)
8.1. [fullname parameter]
9. External service interaction (SMTP)
10. Spoofable client IP address
11. Input returned in response (reflected)
11.1. [city parameter]
11.2. [country parameter]
11.3. [email parameter]
11.4. [fullname parameter]
11.5. [info parameter]
11.6. [notes%5B%5D parameter]
11.7. [shipping parameter]
11.8. [state parameter]
11.9. [street parameter]
11.10. [zip parameter]
11.11. [city parameter]
11.12. [country parameter]
11.13. [email parameter]
11.14. [fullname parameter]
11.15. [info parameter]
11.16. [notes%5B%5D parameter]
11.17. [shipping parameter]
11.18. [state parameter]
11.19. [street parameter]
11.20. [zip parameter]
11.21. [city parameter]
11.22. [country parameter]
11.23. [email parameter]
11.24. [fullname parameter]
11.25. [info parameter]
11.26. [notes%5B%5D parameter]
11.27. [shipping parameter]
11.28. [state parameter]
11.29. [street parameter]
11.30. [zip parameter]
11.31. [city parameter]
11.32. [country parameter]
11.33. [email parameter]
11.34. [fullname parameter]
11.35. [info parameter]
11.36. [notes%5B%5D parameter]
11.37. [shipping parameter]
11.38. [state parameter]
11.39. [street parameter]
11.40. [zip parameter]
12. Suspicious input transformation (reflected)
12.1. [city parameter]
12.2. [country parameter]
12.3. [email parameter]
12.4. [fullname parameter]
12.5. [info parameter]
12.6. [shipping parameter]
12.7. [state parameter]
12.8. [street parameter]
12.9. [zip parameter]
12.10. [city parameter]
12.11. [country parameter]
12.12. [email parameter]
12.13. [fullname parameter]
12.14. [info parameter]
12.15. [shipping parameter]
12.16. [state parameter]
12.17. [street parameter]
12.18. [zip parameter]
12.19. [city parameter]
12.20. [country parameter]
12.21. [email parameter]
12.22. [fullname parameter]
12.23. [info parameter]
12.24. [shipping parameter]
12.25. [state parameter]
12.26. [street parameter]
12.27. [zip parameter]
13. Cross-domain Referer leakage
14. Frameable response (potential Clickjacking)
15. Link manipulation (reflected)
15.1. [language-switcher parameter]
15.2. [language-switcher parameter]
15.3. [name of an arbitrarily supplied URL parameter]
15.4. [language-switcher parameter]
15.5. [name of an arbitrarily supplied URL parameter]
15.6. [language-switcher parameter]
15.7. [name of an arbitrarily supplied URL parameter]
15.8. [language-switcher parameter]
15.9. [name of an arbitrarily supplied URL parameter]
15.10. [language-switcher parameter]
15.11. [name of an arbitrarily supplied URL parameter]
15.12. [language-switcher parameter]
15.13. [name of an arbitrarily supplied URL parameter]
15.14. [language-switcher parameter]
15.15. [name of an arbitrarily supplied URL parameter]
15.16. [language-switcher parameter]
15.17. [name of an arbitrarily supplied URL parameter]
15.18. [language-switcher parameter]
15.19. [name of an arbitrarily supplied URL parameter]
15.20. [language-switcher parameter]
15.21. [name of an arbitrarily supplied URL parameter]
15.22. [language-switcher parameter]
15.23. [name of an arbitrarily supplied URL parameter]
15.24. [language-switcher parameter]
15.25. [name of an arbitrarily supplied URL parameter]
15.26. [language-switcher parameter]
15.27. [name of an arbitrarily supplied URL parameter]
15.28. [language-switcher parameter]
15.29. [name of an arbitrarily supplied URL parameter]
15.30. [language-switcher parameter]
15.31. [name of an arbitrarily supplied URL parameter]
16. Email addresses disclosed
Can anyone tell me how to read the database now?
I have not found any really helpful tutorials on this.
Burp Suite gave me the following vulnerabilities:
1. SQL injection
[fullname parameter]
[street parameter]
2. Cross-site scripting (stored)
3. Cross-site scripting (reflected)
3.1. [info parameter]
3.2. [info parameter]
3.3. [info parameter]
4. Cookie without HttpOnly flag set
5. Unencrypted communications
6. Path-relative style sheet import
7. Cross-site request forgery
8. External service interaction (DNS)
8.1. [fullname parameter]
9. External service interaction (SMTP)
10. Spoofable client IP address
11. Input returned in response (reflected)
11.1. [city parameter]
11.2. [country parameter]
11.3. [email parameter]
11.4. [fullname parameter]
11.5. [info parameter]
11.6. [notes%5B%5D parameter]
11.7. [shipping parameter]
11.8. [state parameter]
11.9. [street parameter]
11.10. [zip parameter]
11.11. [city parameter]
11.12. [country parameter]
11.13. [email parameter]
11.14. [fullname parameter]
11.15. [info parameter]
11.16. [notes%5B%5D parameter]
11.17. [shipping parameter]
11.18. [state parameter]
11.19. [street parameter]
11.20. [zip parameter]
11.21. [city parameter]
11.22. [country parameter]
11.23. [email parameter]
11.24. [fullname parameter]
11.25. [info parameter]
11.26. [notes%5B%5D parameter]
11.27. [shipping parameter]
11.28. [state parameter]
11.29. [street parameter]
11.30. [zip parameter]
11.31. [city parameter]
11.32. [country parameter]
11.33. [email parameter]
11.34. [fullname parameter]
11.35. [info parameter]
11.36. [notes%5B%5D parameter]
11.37. [shipping parameter]
11.38. [state parameter]
11.39. [street parameter]
11.40. [zip parameter]
12. Suspicious input transformation (reflected)
12.1. [city parameter]
12.2. [country parameter]
12.3. [email parameter]
12.4. [fullname parameter]
12.5. [info parameter]
12.6. [shipping parameter]
12.7. [state parameter]
12.8. [street parameter]
12.9. [zip parameter]
12.10. [city parameter]
12.11. [country parameter]
12.12. [email parameter]
12.13. [fullname parameter]
12.14. [info parameter]
12.15. [shipping parameter]
12.16. [state parameter]
12.17. [street parameter]
12.18. [zip parameter]
12.19. [city parameter]
12.20. [country parameter]
12.21. [email parameter]
12.22. [fullname parameter]
12.23. [info parameter]
12.24. [shipping parameter]
12.25. [state parameter]
12.26. [street parameter]
12.27. [zip parameter]
13. Cross-domain Referer leakage
14. Frameable response (potential Clickjacking)
15. Link manipulation (reflected)
15.1. [language-switcher parameter]
15.2. [language-switcher parameter]
15.3. [name of an arbitrarily supplied URL parameter]
15.4. [language-switcher parameter]
15.5. [name of an arbitrarily supplied URL parameter]
15.6. [language-switcher parameter]
15.7. [name of an arbitrarily supplied URL parameter]
15.8. [language-switcher parameter]
15.9. [name of an arbitrarily supplied URL parameter]
15.10. [language-switcher parameter]
15.11. [name of an arbitrarily supplied URL parameter]
15.12. [language-switcher parameter]
15.13. [name of an arbitrarily supplied URL parameter]
15.14. [language-switcher parameter]
15.15. [name of an arbitrarily supplied URL parameter]
15.16. [language-switcher parameter]
15.17. [name of an arbitrarily supplied URL parameter]
15.18. [language-switcher parameter]
15.19. [name of an arbitrarily supplied URL parameter]
15.20. [language-switcher parameter]
15.21. [name of an arbitrarily supplied URL parameter]
15.22. [language-switcher parameter]
15.23. [name of an arbitrarily supplied URL parameter]
15.24. [language-switcher parameter]
15.25. [name of an arbitrarily supplied URL parameter]
15.26. [language-switcher parameter]
15.27. [name of an arbitrarily supplied URL parameter]
15.28. [language-switcher parameter]
15.29. [name of an arbitrarily supplied URL parameter]
15.30. [language-switcher parameter]
15.31. [name of an arbitrarily supplied URL parameter]
16. Email addresses disclosed
Can anyone tell me how to read the database now?
I have not found any really helpful tutorials on this.