Loading HuntDB...

The vulnerabilities found were XSS, Public disclosure, Network enumeration via CSRF, DLL hijacking.

Z
Zomato
Submitted None

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
Summary IP found using ping command- 52.77.124.190 Then I used nmap tool to find the indepth information. I used burp suite and DNS scanner but it was not fruitful. Then I explored some GitHub repositories to perform thorough web-application testing. Using Aquatone I found some hidden domains. The results of Maltego tool and Aquatone differed a lot. The vulnerabilities found were XSS, Public disclosure, Network enumeration via CSRF, DLL hijacking. **Platform(s) Affected:** Website Details: 1. We found a domain which compiles on auth.zomato.com which is running 443 TCP as is well understood that 443 is for SSH and it is brute forcible on the IP address 2. The next utility which I used is gitSploit. It is basically is used to find the vulnerability and I found around 10 of them, the category varies from low to critical. ## Impact Information Disclosure, Server Can be Hijacked although it is not updated

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Cross-Site Request Forgery (CSRF)