Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Abuse cookie-modification, toast HTML and expired domain in CSP-form-action replacing login-page at www.dropbox.com/login to submit creds externally

πŸ‘‰ https://hackerone.com/reports/1590794

πŸ”Ή Severity: High | πŸ’° 6,909 USD
πŸ”Ή Reported To: Dropbox
πŸ”Ή Reported By: #fransrosen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 3:15pm (UTC)
πŸ”₯1
Shop - Reflected XSS With Clickjacking Leads to Steal User's Cookie In Two Domain

πŸ‘‰ https://hackerone.com/reports/1221942

πŸ”Ή Severity: High
πŸ”Ή Reported To: Meredith
πŸ”Ή Reported By: #error201
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 4:12pm (UTC)
Directory Traversal at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1641148

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #0x45
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:27pm (UTC)
springboot actuator is leaking internals at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1662474

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #thpless
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:29pm (UTC)
XSS DUE TO CVE-2022-38463 in https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1681208

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #shuvam321
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:30pm (UTC)
IDOR Lead To VIEW & DELETE & Create api_key [HtUS]

πŸ‘‰ https://hackerone.com/reports/1628012

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #bate5a
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:32pm (UTC)
SSRF ACCESS AWS METADATA - β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1623685

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #0xr3dhunt
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:35pm (UTC)
Unprotected β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ and Test site API Exposes Documents, Credentials, and Emails in β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ Proposal System

πŸ‘‰ https://hackerone.com/reports/745171

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #byteone
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:40pm (UTC)
Full read SSRF at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ [HtUS]

πŸ‘‰ https://hackerone.com/reports/1628102

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #sudi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:52pm (UTC)
an internel important paths disclosure [HtUS]

πŸ‘‰ https://hackerone.com/reports/1631471

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ahmed0x0mahmoud
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 8:54pm (UTC)
SSRF in Functional Administrative Support Tool pdf generator (β–ˆβ–ˆβ–ˆβ–ˆ) [HtUS]

πŸ‘‰ https://hackerone.com/reports/1628209

πŸ”Ή Severity: Critical | πŸ’° 4,000 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #codeprivate
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 9:00pm (UTC)
SQL injection at [https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ] [HtUS]

πŸ‘‰ https://hackerone.com/reports/1627995

πŸ”Ή Severity: Critical | πŸ’° 1,000 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #malcolmx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 9:04pm (UTC)
SQL injection at [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ] [HtUS]

πŸ‘‰ https://hackerone.com/reports/1626198

πŸ”Ή Severity: Critical | πŸ’° 1,000 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #malcolmx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 9:06pm (UTC)
time based SQL injection at [https://β–ˆβ–ˆβ–ˆ] [HtUS]

πŸ‘‰ https://hackerone.com/reports/1627970

πŸ”Ή Severity: Critical | πŸ’° 1,000 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #malcolmx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 9:10pm (UTC)
πŸ”₯1
STORED XSS in β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ/nlc/login.aspx via "edit" GET parameter through markdown editor [HtUS]

πŸ‘‰ https://hackerone.com/reports/1631447

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #shreky
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 14, 2022, 9:13pm (UTC)
No validation to Image upload user can upload ( php APK zip files and can be used as storage purpose)

πŸ‘‰ https://hackerone.com/reports/1644062

πŸ”Ή Severity: Medium | πŸ’° 750 USD
πŸ”Ή Reported To: Linktree
πŸ”Ή Reported By: #bug_vs_me
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 15, 2022, 5:38am (UTC)
[hta3] Remote Code Execution on https://β–ˆβ–ˆβ–ˆ via improper access control to SCORM Zip upload/import

πŸ‘‰ https://hackerone.com/reports/1122791

πŸ”Ή Severity: Critical | πŸ’° 2,000 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cdl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 15, 2022, 1:28pm (UTC)
πŸ‘1
store internal email disclosed through shopify-data-exporter

πŸ‘‰ https://hackerone.com/reports/1605962

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #xenx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 15, 2022, 7:21pm (UTC)
Information exposure in in guzzlehttp/guzzle (https://github.com/nextcloud/3rdparty/tree/master/guzzlehttp/guzzle)

πŸ‘‰ https://hackerone.com/reports/1604606

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #ro0telqayser
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 16, 2022, 2:52am (UTC)
Last video frame is still sent after video is disabled in a call

πŸ‘‰ https://hackerone.com/reports/1641088

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #daniel_calvino_sanchez
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 16, 2022, 4:52am (UTC)
SSRF via potential filter bypass with too lax local domain checking

πŸ‘‰ https://hackerone.com/reports/1608039

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #tomorrowisnew_
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 16, 2022, 5:00am (UTC)