BOOK THIS SPACE FOR AD
ARTICLE ADHi this is karthik,i’m a security researcher and bug bounty hunter.this is my first write up,so if I make any mistakes please let me know.let’s get started.
Actually I was hunting on a responsible disclosure program,i tried to find vulnerabilities like xss,sqli, ssrf,password reset functionalities and also some low hanging fruits ,but I didn’t found anything.
FrustatedAfter hunting for couple of hours continuously, I thought why not to try email verification bypass and the link is like https://example.com/userlogin/7dca95e00f71a5da52af3f7d7ca33da9/
I tried some ways to bypass it ,but didn’t got any success and without verifying email we can’t access our account.
I left that and I thought to go with blind xss in contact form(https://example.com/Contact-Sales/).
So I filled Name and Message parameters with my B-xss payload and email parameter with my email i’d and i was waiting for a while,but didn’t got any response.
Then i was trying to register myself within the same page as a normal user with the same email i’d which i used for blind xss(https://example.com/Contact-Sales/)
When i click on Register,Boom! I’m in🤩 it didn’t asked to verify email and I was inside the application.And iam like
I don’t know how it happened 😂. immediately I wrote a report and i sent to them,they replied me after 2days that it is valid and they rewarded me a bounty €€ and they fixed the issue.
Never miss anything in any application,check each and every endpoint.
Have patience and don’t get frustated if you haven’t got anything,just keep learning and keep focusing.
Get in touch with me at:-
Twitter: https://twitter.com/86Karthik86