![]() |
Exploit security holes - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Website & Server Hacking (https://sinister.ly/Forum-Website-Server-Hacking) +--- Thread: Exploit security holes (/Thread-Exploit-security-holes) |
Exploit security holes - l0cate - 06-11-2023 I scanned an onion address for security holes using Burp Suite. Burp Suite gave me the following vulnerabilities: 1. SQL injection [fullname parameter] [street parameter] 2. Cross-site scripting (stored) 3. Cross-site scripting (reflected) 3.1. [info parameter] 3.2. [info parameter] 3.3. [info parameter] 4. Cookie without HttpOnly flag set 5. Unencrypted communications 6. Path-relative style sheet import 7. Cross-site request forgery 8. External service interaction (DNS) 8.1. [fullname parameter] 9. External service interaction (SMTP) 10. Spoofable client IP address 11. Input returned in response (reflected) 11.1. [city parameter] 11.2. [country parameter] 11.3. [email parameter] 11.4. [fullname parameter] 11.5. [info parameter] 11.6. [notes%5B%5D parameter] 11.7. [shipping parameter] 11.8. [state parameter] 11.9. [street parameter] 11.10. [zip parameter] 11.11. [city parameter] 11.12. [country parameter] 11.13. [email parameter] 11.14. [fullname parameter] 11.15. [info parameter] 11.16. [notes%5B%5D parameter] 11.17. [shipping parameter] 11.18. [state parameter] 11.19. [street parameter] 11.20. [zip parameter] 11.21. [city parameter] 11.22. [country parameter] 11.23. [email parameter] 11.24. [fullname parameter] 11.25. [info parameter] 11.26. [notes%5B%5D parameter] 11.27. [shipping parameter] 11.28. [state parameter] 11.29. [street parameter] 11.30. [zip parameter] 11.31. [city parameter] 11.32. [country parameter] 11.33. [email parameter] 11.34. [fullname parameter] 11.35. [info parameter] 11.36. [notes%5B%5D parameter] 11.37. [shipping parameter] 11.38. [state parameter] 11.39. [street parameter] 11.40. [zip parameter] 12. Suspicious input transformation (reflected) 12.1. [city parameter] 12.2. [country parameter] 12.3. [email parameter] 12.4. [fullname parameter] 12.5. [info parameter] 12.6. [shipping parameter] 12.7. [state parameter] 12.8. [street parameter] 12.9. [zip parameter] 12.10. [city parameter] 12.11. [country parameter] 12.12. [email parameter] 12.13. [fullname parameter] 12.14. [info parameter] 12.15. [shipping parameter] 12.16. [state parameter] 12.17. [street parameter] 12.18. [zip parameter] 12.19. [city parameter] 12.20. [country parameter] 12.21. [email parameter] 12.22. [fullname parameter] 12.23. [info parameter] 12.24. [shipping parameter] 12.25. [state parameter] 12.26. [street parameter] 12.27. [zip parameter] 13. Cross-domain Referer leakage 14. Frameable response (potential Clickjacking) 15. Link manipulation (reflected) 15.1. [language-switcher parameter] 15.2. [language-switcher parameter] 15.3. [name of an arbitrarily supplied URL parameter] 15.4. [language-switcher parameter] 15.5. [name of an arbitrarily supplied URL parameter] 15.6. [language-switcher parameter] 15.7. [name of an arbitrarily supplied URL parameter] 15.8. [language-switcher parameter] 15.9. [name of an arbitrarily supplied URL parameter] 15.10. [language-switcher parameter] 15.11. [name of an arbitrarily supplied URL parameter] 15.12. [language-switcher parameter] 15.13. [name of an arbitrarily supplied URL parameter] 15.14. [language-switcher parameter] 15.15. [name of an arbitrarily supplied URL parameter] 15.16. [language-switcher parameter] 15.17. [name of an arbitrarily supplied URL parameter] 15.18. [language-switcher parameter] 15.19. [name of an arbitrarily supplied URL parameter] 15.20. [language-switcher parameter] 15.21. [name of an arbitrarily supplied URL parameter] 15.22. [language-switcher parameter] 15.23. [name of an arbitrarily supplied URL parameter] 15.24. [language-switcher parameter] 15.25. [name of an arbitrarily supplied URL parameter] 15.26. [language-switcher parameter] 15.27. [name of an arbitrarily supplied URL parameter] 15.28. [language-switcher parameter] 15.29. [name of an arbitrarily supplied URL parameter] 15.30. [language-switcher parameter] 15.31. [name of an arbitrarily supplied URL parameter] 16. Email addresses disclosed Can anyone tell me how to read the database now? I have not found any really helpful tutorials on this. |