Open in app

Sign In

Write

Sign In

Sagar Sajeev
Sagar Sajeev

683 Followers

Home

About

Nov 14, 2022

XSS using a username

Hey guys. I’m Sagar Sajeev This is gonna be a short writeup explaining how I was able to trigger a XSS by trying a payload in the *last name* field . Description The target webapp did have some basic client side XSS protections, which were fairly easy to bypass. Firstly, the…

Bug Bounty

2 min read

XSS using a username
XSS using a username
Bug Bounty

2 min read


Sep 24, 2022

SSTI to XSS using curly braces {}

Hello everyone! My name is Sagar Sajeev and this is my writeup explaining how I was able to escalate a Server Side Template Injection (P4) to a much more severe XSS. Note: For those who haven't heard of Server Side Template Injection or SSTI, I’ll recommend you to get some…

Bug Bounty

3 min read

Escalating SSTI to Reflected XSS using curly braces { }
Escalating SSTI to Reflected XSS using curly braces { }
Bug Bounty

3 min read


Aug 28, 2022

Unsubscribe any user’s e-mail notifications via IDOR

Hello fellow Hackers. I’m Sagar Sajeev In this writeup, I would like to share how I was able to unsubscribe any user from the Target website’s email notification service. This was possible because the unsubscribe feature (which is often found near the footer of the mail) was vulnerable to IDOR. …

Bug Bounty

3 min read

Unsubscribe any user’s e-mail notifications via IDOR
Unsubscribe any user’s e-mail notifications via IDOR
Bug Bounty

3 min read


Aug 15, 2022

Business Logic Vulnerability via IDOR

How’s it going everyone. I’m Sagar Sajeev In this writeup I would like to share how I was able to buy any product off an E-commerce website for $10. This was possible because of vulnerable parameter which made IDOR possible. The target domain was a start-up E-commerce website. I did…

Bug Bounty

3 min read

Business Logic Vulnerability via IDOR
Business Logic Vulnerability via IDOR
Bug Bounty

3 min read


Aug 13, 2022

Escalating Open Redirect to XSS

Hello everyone. Myself Sagar Sajeev. In this writeup, I’ll discuss a how I was able to find a Open Redirect on a target website and escalate it to a XSS, thereby increasing the severity. Let the target domain be:- “https://www.radacted.com/resources?search=hacker” Note that the search term ‘hacker’ was being reflected in…

Bug Bounty

2 min read

Escalating Open Redirect to XSS
Escalating Open Redirect to XSS
Bug Bounty

2 min read


Aug 13, 2022

An Unusual Tale of Email Verification Bypass

Hey Guys. I’m Sagar Sajeev . In this small writeup I would like to share how I reported a case of Email Verification Bypass. But what makes it unique is the way in which it has to be exploited. Let the domain be :- “https://www.redacted.com/account/login” Login into the account as…

Bug Bounty

3 min read

An Unusual Tale of Email Verification Bypass
An Unusual Tale of Email Verification Bypass
Bug Bounty

3 min read


Aug 12, 2022

File Upload Bypass to RCE == $$$$

Hello Everyone. My name is Sagar Sajeev . In this writeup, I’ll explain how I was able to bypass a File upload feature on the target and chain it to an RCE. Thus increasing the severity. The fun thing is that, the target Website Security team had deployed fix 3…

Bug Bounty

4 min read

File Upload Bypass to RCE == $$$$
File Upload Bypass to RCE == $$$$
Bug Bounty

4 min read


Aug 12, 2022

Browser Extensions which have landed $$$ !

What’s up everybody. My name is Sagar Sajeev. This is my writeup about a collection of Browser extensions (Chrome and Firefox) which have actually helped me find me vulns and thus bounties. A browser extension is a small software (aka plugin) for your browser that adds certain functions and features…

Bug Bounty

3 min read

Browser Extensions which have landed $$$ !
Browser Extensions which have landed $$$ !
Bug Bounty

3 min read


Aug 4, 2022

Server Side Template Injection-Something Distinct!

How’s it going guys! My name is Sagar Sajeev and this is my writeup about one of my recent SSTI (Server Side Template Injection) finding. According to Portswigger, Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into a template…

Bug Bounty

3 min read

Server Side Template Injection-Something Distinct!
Server Side Template Injection-Something Distinct!
Bug Bounty

3 min read


Jul 29, 2022

Business Logic Vulnerabilities == $$$

How’s it going everyone! My name is Sagar Sajeev. I had found an interesting Business Logic Flaw and wanted to share it with you guys. According to OWASP , Business Logic Vulnerabilities are ways of using the legitimate processing flow of an application in a way that results in a…

Bug Bounty

3 min read

Business Logic Vulnerabilities == $$$
Business Logic Vulnerabilities == $$$
Bug Bounty

3 min read

Sagar Sajeev

Sagar Sajeev

683 Followers

18 y/o | Security Researcher | Bug Bounty Hunter

Following
  • Jerry Shah (Jerry)

    Jerry Shah (Jerry)

  • ZeusCybersec

    ZeusCybersec

  • Manas Harsh

    Manas Harsh

  • Veshraj Ghimire

    Veshraj Ghimire

  • Vickie Li

    Vickie Li

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech