No one can ever 100% guarantee that there are no holes or any loopholes in his service. And if they can - do not need to believe these people, they are not competent in such matters.
Even on such large projects as Yandex. Money and then
there were holes . So what can we say about a small service for purchases abroad -
eBayToday.ru .
It was a matter of the evening, to do, as they say, I had nothing ... and then I decided purely for the sake of interest to see - are there any holes on the site through which I made so many purchases? Maybe one day I will order a brand new
iPad 3 for myself, and in a day I will come in and find out that my account has been stolen, the address has been changed, and indeed the iPad has long been in someone else’s hands ...
Immediately I will say that
all the holes have already been patched . Support answered me within a day and said that “our specialists have fixed everything, here's a nice bonus of $ 10 for the vulnerabilities found.”
SQL-inj
I'll start with the sweetest, with sqli. This is an injection on the inconspicuous page
http : // ebaytoday. ru / user / addressbook? archive = . With the help of it, it was possible to dump the entire database, with the exception of one: there were no users, no orders, no payment details :) Admins were so great for the campaign that they carried all this archival information into a separate database, which I could not access :)
')
Xss
I checked them with the banal string
'"> <scrip t> al ert (' a '); </ scri pt> - and found a bunch of any XSS with which you can hook up all the users of the service. It terrified me and For this, I decided to continue to look for holes in order to notify the administration as soon as possible.
The most terrible hole that I found is a hole in tickets:
http: // eba ytoday.r u / tickets the subject field is not filtered, the message field is not filtered and what happens? That's right, it turns out that you can steal cookies from the admins themselves and look at their service from the inside. I didn’t become impudent and decided not to look at anything (I barely restrained curiosity).
The following is a list with the usual XSS, which are interesting, but not like the previous ones :)
http: // ebaytoday. ru / ca talog / search? total_query = phone & minprice = & maxprice =The
minprice and
maxprice parameters are not filtered.
http: // ebaytoday. ru / catalog / search? query = phone & category =The
category parameter is not filtered, active XSS.
http: // ebaytoday.ru / forgot /? email =The
email parameter is not filtered.
http: / /ebaytoday.r u / peoplesa y? located = 0 & with_photo =With_photo parameter
is not filtered, active XSS
The holes were filled with 24 more numbers, so, I hope, after so much time, they managed to find for themselves what else I missed.
If you decide to look for holes,
please do not use them . After all, the service is used by the same ordinary people, like us, it is better to notify the administration and do not steal other people's cookies, then you yourself can get into such a mess: (