Page 85 - Hands-On Bug Hunting for Penetration Testers
P. 85

Unsanitized Data – An XSS Case Study                                 Chapter 4

            URL

            This is the URL of the vulnerability. When executing test, code such as BMFSU  , sometimes
            it can be useful to alert a location (for example, BMFSU EPDVNFOU MPDBUJPO ). This way,
            in a single screenshot, you can convey both preliminary proof of the bug and its location in
            the application.


            Payload

            The XSS snippet we used to successfully execute JavaScript will go here. In the case of SQLi,
            a successful password attack, or any number of other payload-based attacks, that data
            would be required as well. If you trip on multiple payload types in one discovery, you
            should mention however many illustrate the general sanitation rules being misapplied:
                 B PONPVTFPWFS  BMFSU EPDVNFOU DPPLJF   YYT MJOL  B


            Methodology

            If you discovered the bug using a particular tool, tell them (and don't use a scanner if they
            explicitly said not to!). It can help the team fielding your report validate your finding if they
            use something similar and can incorporate that into reproducing the issue. In this case, we
            would just say that we submitted the snippet and verified the bug manually.

            It's also useful to list some basic info about the environment in which the vulnerability was
            discovered: your operating system, browser type and version (plus any add-ons or
            extensions if they're relevant), and any miscellaneous information you think is relevant (for
            example, was it discovered in an incognito window? If using DVSM, Postman, or another
            tool, did you use any particular headers?).


            Instructions to Reproduce

            Making sure your instructions are clear enough for the person that evaluated your report is,
            along with the actual payload, the most important information you can provide. A
            screenshot of the vulnerability (for example, the alert window) is great evidence, but could
            easily fall short of winning you a payout if the issue can't be reproduced.










                                                    [ 70 ]
   80   81   82   83   84   85   86   87   88   89   90