• Home
  • Contact

NARESH LAMGADE

Mega Vulnerability: SQL Injection On MEGA.NZ

authorNaresh LamGade
11th March, 2016
bugs

Featured Posts

  • TryHackMe : SQLMAP Writeup
    TryHackMe : SQLMAP Writeup
    16th May, 2021
  • Mega.nz Vulnerability: Payment Bypass on Mega Business
    Mega.nz Vulnerability: Payment Bypass on Mega Bus…
    5th June, 2020
  • Dynamic Execution : ASP.NET with Bootstrap
    Dynamic Execution : ASP.NET with Bootstrap
    28th April, 2017

Categories

blog bug bugs security Tech Tips & Trick TryHackMe tutorial Uncategorized

Naresh LamGade

authorNaresh LamGade
11th March, 2016
bugs

While checking Detectify Lab, I came across XSS Vulnerability on MEGA.CO.NZ which was found by  Frans Rosen  so I  though of doing some test on MEGA  but I  ended with none. I didn’t give up ! after a while I thought of scanning & looking into sub domain of both mega.nz and mega.co.nz and found out eye catching sub-domain.

And it was https://stats.admin.mega.nz/

stats_mega

 

I entered the random logins credential,

 POST / HTTP/1.1
 Host: stats.admin.mega.nz
 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:44.0) Gecko/20100101
 Firefox/44.0
 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 Accept-Language: en-US,en;q=0.5
 Accept-Encoding: gzip, deflate, br
 Referer: https://stats.admin.mega.nz/
 Connection: keep-alive
 Content-Type: application/x-www-form-urlencoded
 Content-Length: 37
 username=admin&password=admin

But no luck and then I added ( ‘ ) to the parameters and it was like :
sql_2
Without any delay, I reported to MEGA at [email protected]

I sent an email at  3:10 PM and after a few minutes I got a reply with :

mega

 

 

#meganz that was the quickest bug fix I have ever seen. 30 min. that was way damn awesome. (y) good job #meganz

— NȺɌɆSĦ ŁȺMǤȺĐɆ (@nlamgade) March 10, 2016


And later : 

 

pay_euro

Nice, they fixed the bug within 30 minutes! and they rewarded me 400 EUR as a bounty.

That was the fastest fix I have ever encountered and I am really thankful for bounty. 🙂

Cheers for MEGA !

 

UPDATE : Again I checked that site for the bug after few months and still it was there and again I reported and again another bounty. :v

another_bounty

 

 

 

SO ANOTHER 400 euro

 

Tips:

  1. Keep on looking for old issues on time to time as there might be many changes on the codebase so bugs might come up again. 
  2. Don’t judge target on the basis of bug submitted as there will be always bugs, you just need to find out and for that,  keep on digging. 
  3.  Never give up. 

 

Comments




Share

Twitter Facebook Google+



  • mega bug
  • mega bug bounty
  • mega security vulnerability
  • mega vuln
  • mega vulnerabilities
  • mega.co.nz vulnerability
  • mega.nz bug bounty
  • mega.nz vulnerability
  • sql injection on mega
  • sql vulnerability on mega

TryHackMe : SQLMAP Writeup
author Naresh LamGade 16th May, 2021
Mega.nz Vulnerability: Payment Bypass on Mega Business
author Naresh LamGade 5th June, 2020
There are no comments.

Leave a Reply
Cancel Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Navigation
  • Home
  • Contact
Copyright © Naresh LamGade. 2025 • All rights reserved.
Proudly published with WordPress.