I Discovered 10 Vulnerabilities in Nokia
My name is Adham Elhansy. I've been studying cybersecurity since I was 14 years old. I'm very passionate about low-level topics like binary exploitation, malware development, reverse engineering, and Red Teaming in general and you can check my own website Adham Elhansye
I started bug bounty hunting about four months ago. It’s both exciting and frustrating at the same time—but that’s fine. Let’s dive in!
Initial Research
Nokia's scope wasn’t clear at all. There were no details about which vulnerabilities were accepted or which assets were in scope.
So, I decided to check previous reports or look for write-ups on Medium about vulnerabilities found in Nokia and I found several reports with simple vulnerabilities like Clickjacking, email spoofing, and low-impact information disclosure.
The scope was always:
- Moving on to JavaScript File Bugs
waymore -i nokia.com -mode U -oU waymore.txt
Then, I filtered them based on status code and JavaScript files:
cat waymore.txt | grep "\.js" | httpx -mc 200 | tee js.txt
I worked on both manual and automated JavaScript analysis.
I set up my VPS and ran:
- Mantra
- JSSecret Finder
- JSNinja
I let them run automatically while manually reviewing specific file names like:
- config.js
- app.js
- main.js
- env.js
- internal.js
First Finding: Disclosure Internal Employee Emails
I found a file:
https://subdomain.nokia.com/config.js
It contained internal employee emails. I reported it, and it was accepted.
Second Finding: API Key Exposure
Note: Automation tools didn’t detect these findings!
Third Finding: Limited Local File Disclosure
I found a Limited Local File Disclosure vulnerability. It exposed internal system files, similar to an LFI but inside JavaScript files.
Unfortunately, it was marked as duplicate.
Final Finding: Open Redirect
I found an internal login page with a parameter:
?redirect_uri=
I tried:
https://attacker.com
but it didn’t work.
After multiple attempts, I found the correct payload:
http:attacker.com
However, this was also marked as duplicate.
---
Final Results
Here’s the breakdown of my findings:
5x Clickjacking
3x JavaScript File Bugs
1x Limited Local File Disclosure
1x Open Redirect
That’s 10 vulnerabilities in total!
4 accepted
6 duplicates
I was also added to the Hall of Fame!
Thank You, Follow me i will publish about bugs in IBM - NASA - Microsoft soon.
Great writeup, looking forward to reading more. Keep up the good work !
ReplyDelete