How I got €50 from <IMG> tag . It literally bypassed everything.(UNEXPECTED BYPASS)

KASHIF_IVT
3 min readMay 5, 2023

--

<img> Never Disappoints

Hello folks ,

https://docs.google.com/presentation/d/1UHiGX-xz0jc7a8JmVpOezj0W1YH7UlneMAM3p0UW-Xs/edit?usp=sharing

This is Kashif , welcome to another write up . In this blog I’ll be sharing my first $bounty . It was August 14, when I was looking for some paid programs apart from hackerone , intigriti , Bug crowd . I end up by opening openbugbounty.com I randomly tapped on a target And observe they had paid bug bounty program so I opened their main website and start looking for xss (My favorite bug). “I know Yours is RCE”

#FINDINGS#

Few days ago I found a DOM XSS bug in a openbugbounty target which executes through POST request . I’ll let you know later about POST request XSS in another write up.

Parameter: ?search=

Location: Blog search

#HUNTING PROCESS(expectations) #

With reference to the above XSS bug . With expectations that I’ll get another xss I opened the main domain and scroll down and than tap on the blog option. Than another webpage open , I without any further testing go to the blog search option and paste some xss payloads and check for reflection but firewall is filters all the special characters. ( <> , “ (){}’ ) . All are encoded well seems no chances of bug .

Alas No luck

#unexpected finding#

One person told on youtube that while testing xss first check for html injection and try to inject basic tags . (like <u> , <h1> ,etc) . While testing I just put my name in the search bar and look for the source code where it is reflects. And check whether <u> is reflected as it is or not but no luck , it is encoded .

#<IMG> tag never disappoints#

With no hope I put xss payload through IMG tag but it also encoded lol . And here we got bug . While entering I mistakenly typed only <IMG SRC=x and I got a broken image as response.

So I checked the source code and found that everything is encoded but IMG tag is reflected twice as it is .

#I THAUGHT THAT I GOT XSS BUT THIS HINDERED ME#

After above finding I simply typed “onerror=alert()> but it didn’t executes . When I check source code IMG tag also encoded. I was hindered and I was like :

#AGAIN NEW CHALLENGE #

But I tried every possible img tag payload and alas no a single one executes . It was my first finding on paid program (“in my mind I think that I have to report fast otherwise someone else will report and I will get duplicate “). So I gave up and tried to submit this report as it is by entering any value in the image tag . And got another challenge here that I can’t enter any lengthy URL here and it allows only few characters as search input.

#Solved#

I observed that every input that is given is appearing in URL so I just typed “<img src=kashif>” as input and changes the URL of image from kashif to a genuine image URL for poc .And reported …

#I GAVE UP AT THE END BUT PLEASE DON’T GIVE UP YOU WILL FIND SOMETHING BIG . “

May be I’ll Also get xss but because of the fear of duplicate I reported it as it is.

#REWARD TIME#

They make it as low severity finding and gave me 50€ via PayPal.

#BONUS #

Check every possible input like normal HTML tags and most importantly image tag . May be it will make your luck .

Hope you learn something new from it.

Don’t forget to follow I’ll be sharing xss through POST request in another write up.

“Fir milte hain next write me..”

Sign up to discover human stories that deepen your understanding of the world.

--

--

Responses (2)

Write a response