XSS on sony Subdomain
quality 5/10 · average
0 net
AI Summary
First-time bug bounty hunter discovered XSS vulnerability on a Sony sandbox subdomain (authtry.dev2.sandbox.dev.ppf.sony.net) through subdomain enumeration using crt.sh, assetfinder, and httprobe, then exploited parameter injection on the target's index.php with a classic XSS payload.
Tags
Entities
Sony
ppf.sony.net
authtry.dev2.sandbox.dev.ppf.sony.net
crt.sh
assetfinder
httprobe
dirsearch
Gökhan Güzelkokar
XSS on Sony subdomain | by Gökhan Güzelkokar - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
XSS on Sony subdomain
Hi guys. This is my first bug bounty writeup. I started to bug bounty on july 22, 2019. I want to share with community all the…
Gökhan Güzelkokar
Follow
~2 min read
·
January 6, 2020 (Updated: December 13, 2021)
·
Free: Yes
Hi guys. This is my first bug bounty writeup. I started to bug bounty on july 22, 2019. I want to share with community all the vulnerabilities I have found.
I choose for large scope programs when looking for bug bounty programs and for improve myself I don't care about bounty now. So I chose SONY.
I started with subdomain enumaration. Firstly, I used crt.sh and I use the following to find potential sub-domains.
##N ow does not support :(
%my%.sony.net
%jira%.sony.net
%jenkins%.sony.net
%test%.sony.net
%staging%.sony.net
%corp%.sony.net
%api%.sony.net
%ws%.sony.net
%.%.%.sony.net
Sometimes just random letters..
%p%.sony.net
%i%.sony.net
%ff%.sony.net
%co%.sony.net
crt.sh
I found this one ( ppf.sony.net ). Then, I used assetfinder and httprobe by tomnomnom for subdomain enumeration and I found a deep sub-domain. Here is our target sub-domain. authtry.dev2.sandbox.dev.ppf.sony.net
assetfinder -subs-only ppf.sony.net | httprobe
authtry.dev2.sandbox.dev.ppf.sony.net
Then, I used dirsearch for secret directories. The default page appeared.
dirsearch.py -u "authtry.dev2.sandbox.dev.ppf.sony.net" -e html,json,php -x 403,500 -t 50
Also, phpinfo is an information disclosure. I submitted another report
When I visit to index.php I got this page.
As you can see we have 2 parameters and if you have parameters on the empty page, firstly try to get XSS. I tried get xss on the page and I got !!
Also my favorite payload :
Thank you !!!
#security #xs #bug-bounty #bugs #bug-bounty-tips
Reporting a Problem
Sometimes we have problems displaying some Medium posts.
If you have a problem that some images aren't loading - try using VPN. Probably you have problem with
access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).