Getting access to disabled/hidden features with the help of Burpsuite Match and Replace settings

A few months ago, During my bug bounty hunting, I came across a Company that lets other developers create API documentation similar to what swagger does and the company provides a 12 day free trial for the developers using their services. Apart from creating documentation they also allow it to be published on their domain.

As I told they restrict users from accessing project management features after a 12 days free trial period. Only users who pay are able to access the project they have created and even publish it publicly.

Now the issue came when I am able to access the project even after the 12 day trial period. The restriction they impose was by client-side rather than server-side. I came to know about this by examining how the web page contents get loaded each time when the web page was refreshed. When the web page was refreshed the page showed the project management at first in a millisecond and redirected to a home page.

Now that I know it is some client-side code doing the thing.I now need to check which API response does the client side code uses for displaying the data on the web page

I came across this API


GET /api/v2/projects/{projectname}/listings HTTP/1.1
Host: [redacted .com]

XSRF-TOKEN: xxxxxxx



So if you notice the response body some of them were set to false, while some were set to true.

Now burp to the rescue!!!. Burp has match and replace settings which is a nice little feature that lets you replace the request or response body headers automatically. This comes in handy in numerous attacks and has helped me over the past years in bug bounty. Especially when looking for blind XSS

Image for post
Image for post

Now that burp replaces all response body having the keyword “false” to “true”
i can access project management page and continue to use it for lifetime.
The vulnerability was fixed by the company and rewarded me with a bounty

You could generate your own match and replace script and exported it on the burp suite.Here is a python script to generate your own match and replace the script.

Thanks @Hamid Mohammad for making it easy to generate custom scripts

Security reasearcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store