I'm starting out as a bug bounty hunter and found a website that might have a problem yet I'm unsure if its exploitable or not.
When sending any payload that contains %
I get an error:
Invalid query parameters: invalid %-encoding (21%)
And this is the response I get on Burp Suite:
HTTP/2 400 Bad Request
Content-Type: text/html;charset=utf-8
Content-Length: 50
Server: nginx/1.18.0 (Ubuntu)
Date: Tue, 11 Feb 2025 16:28:58 GMT
X-Xss-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Request-Id: 08d6829b-beee-4e0f-bae4-3a8e1e8374a4
X-Runtime: 0.002052
Strict-Transport-Security: max-age=31536000
X-Cache: Error from cloudfront
Via: 1.1 fcd8545d1b62265bb65a45721c43e6ac.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: MXP63-P3
X-Amz-Cf-Id: Fj6KlznTqeUPJLt_tDcsb4D7nR2_rKOdPX36RcCodElr0e6Ld3EOQQ==
Invalid query parameters: invalid %-encoding (21%)
Here is another example:
Invalid query parameters: invalid %-encoding
(x'%20OR%20full_name%20LIKE%20'%Bob%)
where the payload is: x' OR full_name LIKE '%Bob%
%
itself. It should encoded as%25
.