Bug Bounty Challenge - Advanced 01

x32x01
  • by x32x01 ||
🕵️‍♀️ You’re testing a web app and find an endpoint that accepts a JWT in the Authorization header.
The server verifies tokens but does not enforce the alg value from a trusted list, and you see a token signed with alg: "HS256".
You try changing the token header to alg: "none" and the server accepts it.

👉 What is the most serious impact you can achieve from this vulnerability? 🤔
  1. Steal users’ plain-text passwords from the database 🗝️
  2. Forge tokens to impersonate an admin account and gain full app access 👑
  3. Trigger server-side remote code execution (RCE) immediately ⚠️
  4. Cause a DoS by flooding token verification calls 🚨
Comment Your Answer Below 👇
 
Related Threads
x32x01
  • x32x01
Replies
0
Views
721
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
16
x32x01
x32x01
x32x01
Replies
0
Views
195
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
679
x32x01
x32x01
x32x01
Replies
0
Views
40
x32x01
x32x01
x32x01
Replies
0
Views
600
x32x01
x32x01
x32x01
Replies
0
Views
96
x32x01
x32x01
x32x01
Replies
0
Views
580
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
58
x32x01
x32x01
Register & Login Faster
Forgot your password?
Forum Statistics
Threads
598
Messages
602
Members
63
Latest Member
Marcan-447-
Back
Top