Issue type | PoC |
---|---|
Cross-site scripting | alert(document.domain) or setInterval`alert\x28document.domain\x29` if
you have to use backticks. [1] Using document.domain instead
of alert(1) can help avoid reporting XSS bugs in sandbox domains. |
Command execution |
Depends of program rules:
|
Code execution |
This involves the manipulation of a web app such that server-side code (e.g. PHP) is executed.
|
SQL injection |
Zero impact
|
Unvalidated redirect |
|
Information exposure | Investigate only with the IDs of your own test accounts — do not leverage the issue against other users' data — and describe your full reproduction process in the report. |
Cross-site request forgery | When designing a real-world example, either hide the form (style="display:none;" )
and make it submit automatically, or design it so that it resembles a component
from the target's page. |
Server-side request forgery |
The impact of a SSRF bug will vary — a non-exhaustive list of proof of concepts includes:
|
Local file read | Make sure to only retrieve a harmless file. Check the program security policy as a specific file may be designated for testing. |
XML external entity processing | Output random harmless data. |
Sub-domain takeover | Claim the sub-domain discreetly and serve a harmless file on a hidden page. Do not serve content on the index page. |
# Bug bounty Report
# Summary
...
# Vulnerability details
...
# Impact
...
# Proof of concept
...
# Browsers verified in
...
# Mitigation
...