Hi, I hope you're well. In this article, I'm writing about how I found Reflected XSS in NCSC UK.
Then, I probed for HTTP Servers on port 80 and 443 using httprobe
One of my friends messaged me in Facebook saying that he found Insecure Deserialization in NCSC UK. This got me curious and I also wanted to report a vulnerability to them but I wanted to do it quickly without digging too deep. So, I started with my usual recon flow.
Reconnaissance
At first, I enumerated subdomains using subfinder which returned about 682 subdomains.
$ cat domains.txt | subfinder -silent -recursive > subdomains.txt
$ cat subdomains.txt | httprobe > probedSubdomains.txt
I was interested in testing an application with login/registration feature, so, I took screenshot of all the domains to choose a target visually.
$ gowitness file -f probedSubdomains.txt
After gowitness ended running, I looked at the screenshots and found an interesting target.
https://my.ncsc.gov.uk
Starting the hunt
I registered for an account and then I started browsing the application to get an idea of how it works and what features it might have. I found that the application was using GraphQL. However, I didn't want to enumerate all the queries and mutations and test them individually to find a vulnerability. I just wanted to find something quickly and withdraw from it because I was feeling quite tired after prior engagement.
So, I continued browsing the web application until I came across the "Change Password" feature. When I clicked on "Change Password" the browser redirected me to a link that looked like this https://URL/change_password?url=https://URL/home
After I changed my password, a button appeared, which when clicked redirected me to https://URL/home.
So, I decided to replace https://URL/home in https://URL/change_password?url=https://URL/home
to javascript:alert(1)
I changed my password again, clicked the button, which executed the payload.
As soon as I found it, I reported it and got +7 Reputation in Hackerone and acknowledgement from NCSC.


.png)

Comments
Post a Comment