I'm starting out as a bug bounty hunter and found a website that might have a problem yet I'm unsure if its exploitable or not.
When sending any payload that contains %
I get an error:
Invalid query parameters: invalid %-encoding (21%)
And this is the response I get on Burp Suite:
HTTP/2 400 Bad Request Content-Type: text/html;charset=utf-8 Content-Length: 50 Server: nginx/1.18.0 (Ubuntu) Date: Tue, 11 Feb 2025 16:28:58 GMT X-Xss-Protection: 1; mode=block X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-Request-Id: 08d6829b-beee-4e0f-bae4-3a8e1e8374a4 X-Runtime: 0.002052 Strict-Transport-Security: max-age=31536000 X-Cache: Error from cloudfront Via: 1.1 fcd8545d1b62265bb65a45721c43e6ac.cloudfront.net (CloudFront) X-Amz-Cf-Pop: MXP63-P3 X-Amz-Cf-Id: Fj6KlznTqeUPJLt_tDcsb4D7nR2_rKOdPX36RcCodElr0e6Ld3EOQQ== Invalid query parameters: invalid %-encoding (21%)
Here is another example:
Invalid query parameters: invalid %-encoding (x'%20OR%20full_name%20LIKE%20'%Bob%)
where the payload is: x' OR full_name LIKE '%Bob%
%
itself. It should encoded as%25
.