Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
DOS: out of memory from gif through upload api

πŸ‘‰ https://hackerone.com/reports/1620170

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Mattermost
πŸ”Ή Reported By: #catenacyber
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 21, 2022, 8:49am (UTC)
size_t-to-int vulnerability in exFAT leads to memory corruption via malformed USB flash drives

πŸ‘‰ https://hackerone.com/reports/1340942

πŸ”Ή Severity: High | πŸ’° 10,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #theflow0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 21, 2022, 7:06pm (UTC)
πŸ”₯3
Create product discounts of any shop

πŸ‘‰ https://hackerone.com/reports/1571578

πŸ”Ή Severity: Medium | πŸ’° 4,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #datph4m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 21, 2022, 10:39pm (UTC)
Add products to any livestream.

πŸ‘‰ https://hackerone.com/reports/1654657

πŸ”Ή Severity: Medium | πŸ’° 3,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #datph4m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 21, 2022, 10:41pm (UTC)
DLL Search-Order Hijacking Vulnerability in work-64-exe-v7.16.3-1.exe

πŸ‘‰ https://hackerone.com/reports/1519437

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #is-
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 3:19am (UTC)
XSS in ZenTao integration affecting self hosted instances without strict CSP

πŸ‘‰ https://hackerone.com/reports/1542510

πŸ”Ή Severity: High | πŸ’° 13,950 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 9:10am (UTC)
πŸ”₯3
Regex account takeover

πŸ‘‰ https://hackerone.com/reports/1581059

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #ghaem51
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:00pm (UTC)
Persistent CSS injection with ’marked’ markdown parser in Rocket.Chat

πŸ‘‰ https://hackerone.com/reports/1401268

πŸ”Ή Severity: High
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #danieljpp
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:00pm (UTC)
It is possible to elevate privileges for any authenticated user to view permissions matrix and view Direct messages without appropriate permissions.

πŸ‘‰ https://hackerone.com/reports/917946

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #garretby
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:00pm (UTC)
getUserMentionsByChannel leaks messages with mention from private channel

πŸ‘‰ https://hackerone.com/reports/1410246

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:01pm (UTC)
Bypass local authentication (PIN code)

πŸ‘‰ https://hackerone.com/reports/1126414

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #dago_669
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:01pm (UTC)
Unintended information disclosure in the Hubot Log files

πŸ‘‰ https://hackerone.com/reports/1394399

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #rolfzur
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:01pm (UTC)
REST API gets `query` as parameter and executes it

πŸ‘‰ https://hackerone.com/reports/1140631

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #paulocsanz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:02pm (UTC)
Message ID Enumeration with Action Link Handler

πŸ‘‰ https://hackerone.com/reports/1406953

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:02pm (UTC)
TOTP 2 Factor Authentication Bypass

πŸ‘‰ https://hackerone.com/reports/1448268

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:02pm (UTC)
getRoomRoles Method leaks Channel Owner

πŸ‘‰ https://hackerone.com/reports/1447440

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
NoSQL-Injection discloses S3 File Upload URLs

πŸ‘‰ https://hackerone.com/reports/1458020

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
API route chat.getThreadsList leaks private message content

πŸ‘‰ https://hackerone.com/reports/1446767

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
Message ID Enumeration with Regular Expression in getReadReceipts Meteor method

πŸ‘‰ https://hackerone.com/reports/1377105

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
Rocket.chat user info security issue

πŸ‘‰ https://hackerone.com/reports/1517377

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #mikolajczak
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:04pm (UTC)
getUsersOfRoom discloses users in private channels

πŸ‘‰ https://hackerone.com/reports/1410357

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:04pm (UTC)