Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
getRoomRoles Method leaks Channel Owner

πŸ‘‰ https://hackerone.com/reports/1447440

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
NoSQL-Injection discloses S3 File Upload URLs

πŸ‘‰ https://hackerone.com/reports/1458020

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
API route chat.getThreadsList leaks private message content

πŸ‘‰ https://hackerone.com/reports/1446767

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
Message ID Enumeration with Regular Expression in getReadReceipts Meteor method

πŸ‘‰ https://hackerone.com/reports/1377105

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:03pm (UTC)
Rocket.chat user info security issue

πŸ‘‰ https://hackerone.com/reports/1517377

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #mikolajczak
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:04pm (UTC)
getUsersOfRoom discloses users in private channels

πŸ‘‰ https://hackerone.com/reports/1410357

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:04pm (UTC)
Unauthenticated IP allowlist bypass when accessing job artifacts through gitlab pages at `{group_id}.gitlab.io`

πŸ‘‰ https://hackerone.com/reports/1591412

πŸ”Ή Severity: Medium | πŸ’° 1,990 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 9:31pm (UTC)
πŸ”₯1
Content injection in Jira issue title enabling sending arbitrary POST request as victim

πŸ‘‰ https://hackerone.com/reports/1533976

πŸ”Ή Severity: High | πŸ’° 8,690 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 9:32pm (UTC)
πŸ”₯1
Open Redirect on www.redditinc.com via `failed` query param

πŸ‘‰ https://hackerone.com/reports/1257753

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 11:27pm (UTC)
com.basecamp.bc3 Webview Javascript Injection and JS bridge takeover

πŸ‘‰ https://hackerone.com/reports/1343300

πŸ”Ή Severity: High | πŸ’° 1,210 USD
πŸ”Ή Reported To: Basecamp
πŸ”Ή Reported By: #fr4via
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 9:33am (UTC)
CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag

πŸ‘‰ https://hackerone.com/reports/1671140

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:16pm (UTC)
CVE-2022-35948: CRLF Injection in Nodejs β€˜undici’ via Content-Type

πŸ‘‰ https://hackerone.com/reports/1664019

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:38pm (UTC)
πŸ‘1
[CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname

πŸ‘‰ https://hackerone.com/reports/1663788

πŸ”Ή Severity: Medium | πŸ’° 1,200 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:51pm (UTC)
Reflected xss on videostore.mtnonline.com

πŸ‘‰ https://hackerone.com/reports/1646248

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #possowski
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 25, 2022, 7:10pm (UTC)
Main Domain Takeover at https://www.marketo.net/

πŸ‘‰ https://hackerone.com/reports/1661914

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #gdattacker
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 26, 2022, 3:05pm (UTC)
XSS Reflected on reddit.com via url path

πŸ‘‰ https://hackerone.com/reports/1051373

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #criptex
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 4:04pm (UTC)
insecure gitlab repositories at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ [HtUS]

πŸ‘‰ https://hackerone.com/reports/1624152

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #thpless
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 6:18pm (UTC)
password field autocomplete enabled

πŸ‘‰ https://hackerone.com/reports/1023773

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #er_salil
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 27, 2022, 11:26pm (UTC)
CORS Misconfiguration on Yelp

πŸ‘‰ https://hackerone.com/reports/1707616

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #qualwin3001
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 28, 2022, 3:43am (UTC)
Directory Listing vulnerability on β–ˆ.packet8.net/php/include/

πŸ‘‰ https://hackerone.com/reports/790846

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #rajauzairabdullah
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 4:41am (UTC)
Server-side request forgery (ssrf)

πŸ‘‰ https://hackerone.com/reports/1712240

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #raja404
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: September 28, 2022, 7:54am (UTC)