By Anna Hammond
October 27, 2021
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from October 18 to 25.
Intigriti’s October XSS challenge By @0xTib3rius
DataExtractor is a Burp extension by @gwendallecoguic that adds passive scans to extract data from source code.
There are already other tools to do the same thing, but this one is particularly interesting because it is easily customizable. It allows you to ignore extensions and to use regexp to ignore files, extract data or exclude results.
Discourse SNS webhook RCE (Discourse)
This is a great writeup by @joernchen. He exploited Discourse’s AWS notification webhook handler to obtain OS command injection. It wasn’t that simple of course! SNS messages must be signed by Amazon. Bypassing the payload’s signature involved chaining weaknesses in AWS SNS and in Ruby’s x509 parsing, and a lot of staring at the code.
Design Flaw in Security Product – ALLES! CTF 2021, @LiveOverflow’s video, & @gregxsunday’s walkthrough
@liveoverflow released this fun Web app challenge that he created for the ALLES! CTF 2021. I don’t want to spoil what the vulnerability is, so let’s just say that it involves WAF bypass and blind exploitation.
Nuclei token-spray templates, Token Spray – Introduction to self-contained template & A Snapshot of CAST in Action: Automating API Token Testing
Have you ever found an exposed API token without knowing for which service it is intended? This happens often to the Bishop Fox CAST team. So, they created Nuclei templates to quickly check the validity of an API token against all possible services.
Interestingly, these new templates are “self-contained”. This new type of Nuclei template “does not require any external information to run, such as target or input URLs.”
Katie Explains: Modern Web Development (GIVEAWAY)
This is an amazing introduction to the modern Web for bug hunters. If you want to know what today’s websites are made of, this is the most beginner friendly video that you’ll find.
@InsiderPhD explains microservices, the OOP paradigm, the MVC model, frameworks, middleware, controllers, inheritance, etc, and what all this means in terms of bugs that you should look for.
S1E1: What is Bug Bounty Hunting & “The Suck Factor”, S1E2: Tools – Hacking with “The Firefox”, S1E3: Tools – Connect Burp Suite to Firefox and the Advanced Proxy, S1E4: Tools – Notepad++, IP Vanish, Python 3, and Google & S1E5: Payload Basics & Intro to SQL Injection (Login Bypass)
$2,500 Leaking parts of private Hackerone reports – timeless cross-site leaks
INDIAN HACKER with Mind BLOWING Achievements 🤩 HACKING At It’s Best…
Career and Community building with Bug Bounties | NahamCon Panel
Moodle – Stored XSS and blind SSRF possible via feedback answer text #Web
Support Board 3.3.4 Arbitrary File Deletion to Remote Code Execution #Web #CodeReview
Multiple vulnerabilities in Nagios XI < 5.8.6 #Web #CodeReview
SuDump: Exploiting suid binaries through the kernel #Linux #LPE
A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection (Amazon)
CVE-2021-2471 MySQL JDBC XXE (Oracle)
All Your (d)Base Are Belong To Us, Part 2: Code Execution in Microsoft Office (CVE-2021-38646) (Microsoft)
Google Chrome Vulnerability Worth for $6K: Use After Free (CVE-2021-30573) (Google, $6,000)
Deleting all DMs on RedditGifts.com (Reddit, $5,000)
How I was able to revoke your Instagram 2FA (Facebook, $5,000)
Hash-Collision Denial-of-Service Vulnerability in Markdown Parser (Reddit, $500)
IDOR to pay less for coin purchases on oauth.reddit.com (Reddit, $500)
See more writeups on The list of bug bounty writeups.
Go Whois: WHOIS library, CLI tool and server with restful APIs to query whois information for domains and IPs
ZipExec: A unique technique to execute binaries from a password protected zip for EDR bypass
Phishious: An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers
How to Hack Like a Ghost – Breaching the Cloud (starting at $20.99 on Amazon)
Internal Security Assessment: Field Guide (Updated) (starting at $8.99)
Using Kerberos for Authentication Relay Attacks & Windows Exploitation Tricks: Relaying DCOM Authentication