Sitemap

Member-only story

$1,000 Bounty for Bypassing Restrictions via Modified HTTP Request

2 min readJun 7, 2025

--

Hello,

here i want to publish one of my recent finding which helped me to earned $1,000 bounty

i reported normal Bruteforce to Target.com/user/xyz/login , unfortunately i got duplicate and first reporter got $500 bounty at Medium severity.

after 2 months, i see report has been fixed. Team disabled the /user/xyz/register and /user/xyz/login also but the Login form was still there, when i click submit it gives me “Error” even with Valid credentials.

i quickly opened Burp and viewed the request which looks like :-

OPTIONS /user/xyz/login HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:139.0) Gecko/20100101 Firefox/139.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Access-Control-Request-Method: POST
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Priority: u=4
Te: trailers
Connection: keep-alive

I am unabe to see credentials which i used to Login, i quicky send this request to burp repeater , and just changed method from OPTIONS to POST , see below

--

--

Responses (1)