mirror of
https://github.com/fuzzdb-project/fuzzdb.git
synced 2024-11-22 11:03:05 +00:00
.. | ||
README.md | ||
redirect-injection-template.txt | ||
redirect-urls-template.txt |
- redirect-injection-template.txt
- Patterns for injecting into a value for attempting to bypass many input validation filters that intended to only allow only relative links on the same origin.
- Patterns for injecting into a value for attempting to bypass many input validation filters that intended to only allow only relative links on the same origin.
- redirect-urls-template.txt
- URL patterns that commonly lead to open redirect.
- URL patterns that commonly lead to open redirect.
Usage:
Replace {target} in files with ip or hostname and path, Examples:
- evil.com
- evil.com/badurl
- 1.2.3.4
- 134744072
Testing techniques:
Filter Bypass
- If periods are being stripped by the filter so that evil.com becomes evilcom, try converting the ip address to decimal notation form. http://www.geektools.com/geektools-cgi/ipconv.cgi
- Try URL-encoding the replacement value for {target} Other Issues
- If redirect.injection.template.txt usage results in the server proxying a request to the injected URL and returning its contents instead of redirecting to it, explore how this could be used to explore the servers localhost ports for web services, protected systems in a DMZ, interact through GET requests/REST interfaces, etc.
TODO