BOOK THIS SPACE FOR AD
ARTICLE ADHello All,
Today, I’ll share one of my findings on Bugcrowd. I will refer to the target as mytarget.com.
Introduction:
SQL Injection (SQLi) is one of the most dangerous vulnerabilities affecting web applications. This write-up details my experience discovering and responsibly reporting an SQLi vulnerability in a government web application .
How I Started the Testing:
You might think that I started with Recon, and you’re right. However, if you ask many researchers how they try to discover hidden parameters, most will tell you they use tools like waybackurls, arjun, or paramspider. Those are great methods, but I want to highlight that some parameters can’t be discovered using these tools alone.
So, what’s the additional method I suggest? Here it is: open your target normally, enable traffic interception in Burp Suite, and start browsing through links and pages. Afterward, review the Burp history for potential parameters.
Using this method, I discovered the vulnerable parameter that led to my finding.
While exploring mytarget.com, I came across an interesting endpoint:
http://mytarget.com/?pageID=licensees&reportID=3003&sort=full_name.