P4 bug’s and their POC steps | Part 9

16 hours ago 5
BOOK THIS SPACE FOR AD
ARTICLE AD

socalledhacker

Read For Free Here:- https://nexguardians.com/p4-bugs-and-their-poc-steps-part-9/

This is part 9 of P4 bug’s if you haven’t check previous part then check it out. Part 1 , Part 2, Part 3, Part 4, Part 5, Part 6, Part 7, Part 8

Hi everyone, I am socalledhacker, i am a security researcher , penetration tester, certified ethical hacker and a web3 noob. In past months, I have discover lot’s of bugs but in today’s article we are going to discuss about low hanging fruits or P4 vuln’s as they are very easy to find and also present in almost every website. So let’s start with our first vulnerability.

This is a common type of bug available in lot’s of websites, i discovered this bug in lot’s of programs even some of these are hosted on platforms like hackerone, bugcrowd etc.

When you signup in a website then it send a verification link on email address and in that email there is something like Hi <Yourname> , so to find HTML email injection you have to put HTML payload in First name and Last name while signing up in a website as only this data reflects in the email sent by the website.

So you have to put payload like this given below. (Make your own image payload), and this payload will fire up in your email and if website…

Read Entire Article