Null byte Injection in https://████/
High
Vulnerability Details
#Description:
Microsoft .NET Framework is prone to multiple NULL-byte injection vulnerabilities because it fails to adequately sanitize user-supplied data.
#Vulnerable URL: https://████/%2F%20This%20website%20is%20vulnerable%20to%20NULL%20BYTE%20INJECTION/
#Steps to Reproduce:
1) An attacker can exploit this issue via a browser.
The following example URI request is available:
https://███████/%2F%20This%20website%20is%20vulnerable%20to%20NULL%20BYTE%20INJECTION%00
#Mitigation: https://www.securityfocus.com/bid/24791/solution
#See Also: https://www.exploit-db.com/exploits/30281
#Proof of Concept: Screenshots attached.
## Impact
An attacker can exploit these issues to access sensitive information that may aid in further attacks; other attacks are also possible.
Actions
View on HackerOneReport Stats
- Report ID: 709072
- State: Closed
- Substate: resolved
- Upvotes: 7