Access Granted !

Vikas Rai
2 min readDec 26, 2024

--

As a cybersecurity enthusiast and bug bounty hunter, there’s no better feeling than discovering a critical vulnerability that contributes to the security of a major organization. Recently, I uncovered a P1 security misconfiguration on the admin dashboard of Tata Motors’ website through diligent enumeration and manual testing. Here’s the detailed journey of how I found and responsibly reported this bug.

Firstly, I started with Subdomain Enumeration using tools sublist3r and subfinder. Then I filtered out the live subdomains using HTTPX tool.

During manual exploration of live subdomains, I found a subdomain that led to a login page. This piqued my interest, as login functionalities often indicate a higher chance of sensitive operations.

I decided to test for default credentials, a practice that, while simple, often yields significant results. After just two attempts, I was able to log in as an admin using a set of common username and password.

  • Username: admin
  • Password: admin

Once logged in, I had complete access to the admin dashboard. I could add, modify and delete their customer details.

The severity of this issue lay in the fact that an unauthorized individual could easily compromise sensitive data and disrupt operations. For a company of Tata Motors’ stature, using such weak credentials on a critical asset was shocking.

Few Thing to take note here :
1. Never Underestimate Basic Attacks: Even large organizations can overlook simple security best practices.
2. Enumeration is Key: A thorough reconnaissance phase is crucial to uncovering hidden vulnerabilities.

If you’re a bug bounty hunter, always start with the basics — you never know what you might uncover.

Happy Hunting!

--

--

Vikas Rai
Vikas Rai

Written by Vikas Rai

I'm a cybersecurity enthusiast and bug bounty hunter with a passion for uncovering vulnerabilities and enhancing web security.

No responses yet