Skip to content

Commit

Permalink
Update Hunting_for_bugs_in_signup_feature.md
Browse files Browse the repository at this point in the history
  • Loading branch information
V35HR4J authored Nov 27, 2021
1 parent 3bccc55 commit 056e96b
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ Insufficient Email Verification means the application doesn’t verify the email
> [https://hackerone.com/reports/617896](https://hackerone.com/reports/617896)
> [https://hackerone.com/reports/737169](https://hackerone.com/reports/737169)
#### 5\. Path Overwrite
#### 6\. Path Overwrite

If an application allows users to check their profile with direct path /{username} always try to signup with system reserved file names, such as index.php, signup.php, login.php, etc. In some cases what happens here is, when you signup with username: `index.php`, now upon visiting target.tld/index.php, your profile will comeup and occupy the index.php page of an application. Similarly, if an attacker is able to signup with username `login.php`, Imagine login page getting takeovered.

Expand Down

0 comments on commit 056e96b

Please sign in to comment.