Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Bypass for Domain-level redirects (Unvalidated Redirects and Forwar)

πŸ‘‰ https://hackerone.com/reports/1582160

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #thypon
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 22, 2022, 10:57pm (UTC)
User can link non-public file attachments, leading to file disclose on edit by higher-privileged user

πŸ‘‰ https://hackerone.com/reports/763177

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #foobar7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 26, 2022, 6:25pm (UTC)
Credential leak when use two url

πŸ‘‰ https://hackerone.com/reports/1569926

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #chen172
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 27, 2022, 6:55am (UTC)
CVE-2022-32208: FTP-KRB bad message verification

πŸ‘‰ https://hackerone.com/reports/1590071

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 6:55am (UTC)
CVE-2022-32207: Unpreserved file permissions

πŸ‘‰ https://hackerone.com/reports/1573634

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 6:55am (UTC)
CVE-2022-32206: HTTP compression denial of service

πŸ‘‰ https://hackerone.com/reports/1570651

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 6:55am (UTC)
CVE-2022-32205: Set-Cookie denial of service

πŸ‘‰ https://hackerone.com/reports/1569946

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 6:56am (UTC)
Rails::Html::SafeListSanitizer vulnerable to xss attack in an environment that allows the style tag

πŸ‘‰ https://hackerone.com/reports/1599573

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #windshock
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 11:46am (UTC)
API docs expose an active token for the sample domain theburritobot.com

πŸ‘‰ https://hackerone.com/reports/1507412

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #sainaen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 4:23pm (UTC)
Sign in with Apple works on existing accounts, bypasses 2FA

πŸ‘‰ https://hackerone.com/reports/1593404

πŸ”Ή Severity: High | πŸ’° 1,000 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #mattipv4
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 4:24pm (UTC)
πŸ‘1
Sign in with Apple generates long-life JWTs, seemingly irrevocable, that grant immediate access to accounts

πŸ‘‰ https://hackerone.com/reports/1593413

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #mattipv4
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 4:25pm (UTC)
Bypassing Cache Deception Armor using .avif extension file

πŸ‘‰ https://hackerone.com/reports/1391635

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #bombon
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 4:27pm (UTC)
HTTP request smuggling with Origin Rules using newlines in the host_header action parameter

πŸ‘‰ https://hackerone.com/reports/1575912

πŸ”Ή Severity: Critical | πŸ’° 3,100 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #albertspedersen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 4:32pm (UTC)
Reflected XSS via `β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ` parameter

πŸ‘‰ https://hackerone.com/reports/1536215

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #mdakh404
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 7:23pm (UTC)
Unauthorized Access to Internal Server Panel without Authentication

πŸ‘‰ https://hackerone.com/reports/1548067

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ahmd_halabi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 7:24pm (UTC)
CVE-2022-32207: Unpreserved file permissions

πŸ‘‰ https://hackerone.com/reports/1614331

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 7:52pm (UTC)
CVE-2022-32205: Set-Cookie denial of service

πŸ‘‰ https://hackerone.com/reports/1614328

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 7:53pm (UTC)
CVE-2022-32206: HTTP compression denial of service

πŸ‘‰ https://hackerone.com/reports/1614330

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 7:53pm (UTC)
CVE-2022-32208: FTP-KRB bad message verification

πŸ‘‰ https://hackerone.com/reports/1614332

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 27, 2022, 8:09pm (UTC)
XSS Payload on TikTok Seller Center endpoint

πŸ‘‰ https://hackerone.com/reports/1554048

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #aidilarf_2000
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 29, 2022, 1:10am (UTC)
Browser is not following proper flow for redirection cause open redirect

πŸ‘‰ https://hackerone.com/reports/1579374

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: Brave Software
πŸ”Ή Reported By: #abhinavsecondary
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 30, 2022, 5:45pm (UTC)