Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Controllable read beyond bounds in lua_websocket_readbytes() [zhbug_httpd_126]

πŸ‘‰ https://hackerone.com/reports/1595290

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:45pm (UTC)
πŸ‘1
Read beyond bounds in mod_isapi.c [zhbug_httpd_41]

πŸ‘‰ https://hackerone.com/reports/1595296

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:50pm (UTC)
Read beyond bounds via ap_rwrite() [zhbug_httpd_47.2]

πŸ‘‰ https://hackerone.com/reports/1595299

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:54pm (UTC)
Apache HTTP Server: mod_proxy_ajp: Possible request smuggling

πŸ‘‰ https://hackerone.com/reports/1594627

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #ricterz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 7:25pm (UTC)
DoS via lua_read_body() [zhbug_httpd_94]

πŸ‘‰ https://hackerone.com/reports/1596252

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 8:19pm (UTC)
Blind SSRF at packagist.maximum.nl

πŸ‘‰ https://hackerone.com/reports/1538056

πŸ”Ή Severity: No Rating | πŸ’° 75 USD
πŸ”Ή Reported To: Radancy
πŸ”Ή Reported By: #dk4trin
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 10, 2022, 12:38pm (UTC)
Homograph attack bypass cause redirection

πŸ‘‰ https://hackerone.com/reports/1285245

πŸ”Ή Severity: No Rating | πŸ’° 50 USD
πŸ”Ή Reported To: Vanilla
πŸ”Ή Reported By: #malek
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 10, 2022, 9:38pm (UTC)
Server Side Template Injection on Name parameter during Sign Up process

πŸ‘‰ https://hackerone.com/reports/1104349

πŸ”Ή Severity: High
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #battle_angel
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 8:42am (UTC)
Getting a free delivery by singing up from "[email protected]"

πŸ‘‰ https://hackerone.com/reports/1296584

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #cmuppin
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 8:42am (UTC)
Mass Account Takeover at https://app.taxjar.com/ - No user Interaction

πŸ‘‰ https://hackerone.com/reports/1581240

πŸ”Ή Severity: Critical | πŸ’° 11,500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #beerboy_ankit
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 1:50pm (UTC)
πŸ‘3πŸ‘2
Able to view hackerone reports attachments

πŸ‘‰ https://hackerone.com/reports/979787

πŸ”Ή Severity: Critical | πŸ’° 12,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #sateeshn
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 4:00pm (UTC)
🀯3πŸ‘1
Theme editor `oseid` parameter is leaked to third-party services through the `Referer` header which leads to somekind of storefront password bypass.

πŸ‘‰ https://hackerone.com/reports/1262434

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #saltymermaid
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 5:13pm (UTC)
Collaborators and Staff members without all necessary permissions are able to create, edit and install custom apps

πŸ‘‰ https://hackerone.com/reports/1555502

πŸ”Ή Severity: Medium | πŸ’° 1,900 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #kun_19
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 5:50pm (UTC)
πŸ‘1
Improper deep link validation

πŸ‘‰ https://hackerone.com/reports/1087744

πŸ”Ή Severity: Low | πŸ’° 600 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #fr4via
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 7:51pm (UTC)
[h1-2102] Improper Access Control at https://shopify.plus/[id]/users/api in operation UpdateOrganizationUserTfaEnforcement

πŸ‘‰ https://hackerone.com/reports/1085042

πŸ”Ή Severity: Medium | πŸ’° 950 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #ramsexy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 9:15pm (UTC)
[h1-2102] Stored XSS in product description via `productUpdate` GraphQL query leads to XSS at handshake-web-internal.shopifycloud.com/products/[ID]

πŸ‘‰ https://hackerone.com/reports/1085546

πŸ”Ή Severity: Medium | πŸ’° 1,600 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #intidc
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 9:33pm (UTC)
[h1-2102] HTML injection in packing slips can lead to physical theft

πŸ‘‰ https://hackerone.com/reports/1087122

πŸ”Ή Severity: Low | πŸ’° 900 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #intidc
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 11, 2022, 9:35pm (UTC)
πŸ‘1
Github base action takeover which is used in `github.com/Shopify/unity-buy-sdk`

πŸ‘‰ https://hackerone.com/reports/1439355

πŸ”Ή Severity: Low | πŸ’° 800 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #codermak
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 12, 2022, 4:17am (UTC)
πŸ€”1
[CVE-2021-44228] nps.acronis.com is vulnerable to the recent log4shell 0-day

πŸ‘‰ https://hackerone.com/reports/1425474

πŸ”Ή Severity: Critical | πŸ’° 1,000 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #rhinestonecowboy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 12:26am (UTC)
πŸ‘1
CVE-2021-40438 on cp-eu2.acronis.com

πŸ‘‰ https://hackerone.com/reports/1370731

πŸ”Ή Severity: High | πŸ’° 150 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #savik
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 3:17am (UTC)
rubygems.org Batching attack to `confirmation_token` by bypass rate limit

πŸ‘‰ https://hackerone.com/reports/1559262

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #ooooooo_q
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 4:04am (UTC)