Skip to content

Commit 056e96b

Browse files
authored
Update Hunting_for_bugs_in_signup_feature.md
1 parent 3bccc55 commit 056e96b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Sign_Up_Functionality/Hunting_for_bugs_in_signup_feature.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Insufficient Email Verification means the application doesn’t verify the email
100100
> [https://hackerone.com/reports/617896](https://hackerone.com/reports/617896)
101101
> [https://hackerone.com/reports/737169](https://hackerone.com/reports/737169)
102102
103-
#### 5\. Path Overwrite
103+
#### 6\. Path Overwrite
104104

105105
If an application allows users to check their profile with direct path /{username} always try to signup with system reserved file names, such as index.php, signup.php, login.php, etc. In some cases what happens here is, when you signup with username: `index.php`, now upon visiting target.tld/index.php, your profile will comeup and occupy the index.php page of an application. Similarly, if an attacker is able to signup with username `login.php`, Imagine login page getting takeovered.
106106

0 commit comments

Comments
 (0)