Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
getUsersOfRoom discloses users in private channels

πŸ‘‰ https://hackerone.com/reports/1410357

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #gronke
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 4:04pm (UTC)
Unauthenticated IP allowlist bypass when accessing job artifacts through gitlab pages at `{group_id}.gitlab.io`

πŸ‘‰ https://hackerone.com/reports/1591412

πŸ”Ή Severity: Medium | πŸ’° 1,990 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 9:31pm (UTC)
πŸ”₯1
Content injection in Jira issue title enabling sending arbitrary POST request as victim

πŸ‘‰ https://hackerone.com/reports/1533976

πŸ”Ή Severity: High | πŸ’° 8,690 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 9:32pm (UTC)
πŸ”₯1
Open Redirect on www.redditinc.com via `failed` query param

πŸ‘‰ https://hackerone.com/reports/1257753

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 22, 2022, 11:27pm (UTC)
com.basecamp.bc3 Webview Javascript Injection and JS bridge takeover

πŸ‘‰ https://hackerone.com/reports/1343300

πŸ”Ή Severity: High | πŸ’° 1,210 USD
πŸ”Ή Reported To: Basecamp
πŸ”Ή Reported By: #fr4via
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 9:33am (UTC)
CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag

πŸ‘‰ https://hackerone.com/reports/1671140

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:16pm (UTC)
CVE-2022-35948: CRLF Injection in Nodejs β€˜undici’ via Content-Type

πŸ‘‰ https://hackerone.com/reports/1664019

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:38pm (UTC)
πŸ‘1
[CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname

πŸ‘‰ https://hackerone.com/reports/1663788

πŸ”Ή Severity: Medium | πŸ’° 1,200 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:51pm (UTC)
Reflected xss on videostore.mtnonline.com

πŸ‘‰ https://hackerone.com/reports/1646248

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #possowski
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 25, 2022, 7:10pm (UTC)
Main Domain Takeover at https://www.marketo.net/

πŸ‘‰ https://hackerone.com/reports/1661914

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #gdattacker
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 26, 2022, 3:05pm (UTC)
XSS Reflected on reddit.com via url path

πŸ‘‰ https://hackerone.com/reports/1051373

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #criptex
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 4:04pm (UTC)
insecure gitlab repositories at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ [HtUS]

πŸ‘‰ https://hackerone.com/reports/1624152

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #thpless
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 6:18pm (UTC)
password field autocomplete enabled

πŸ‘‰ https://hackerone.com/reports/1023773

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #er_salil
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 27, 2022, 11:26pm (UTC)
CORS Misconfiguration on Yelp

πŸ‘‰ https://hackerone.com/reports/1707616

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #qualwin3001
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 28, 2022, 3:43am (UTC)
Directory Listing vulnerability on β–ˆ.packet8.net/php/include/

πŸ‘‰ https://hackerone.com/reports/790846

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #rajauzairabdullah
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 4:41am (UTC)
Server-side request forgery (ssrf)

πŸ‘‰ https://hackerone.com/reports/1712240

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #raja404
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: September 28, 2022, 7:54am (UTC)
DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)

πŸ‘‰ https://hackerone.com/reports/1632921

πŸ”Ή Severity: High
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #zeyu2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 8:38am (UTC)
Take over subdomains of r2.dev using R2 custom domains

πŸ‘‰ https://hackerone.com/reports/1700276

πŸ”Ή Severity: Medium | πŸ’° 1,125 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #albertspedersen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 12:49pm (UTC)
CSV export/import functionality allows administrators to modify member and message content of a workspace

πŸ‘‰ https://hackerone.com/reports/1661310

πŸ”Ή Severity: No Rating | πŸ’° 250 USD
πŸ”Ή Reported To: Slack
πŸ”Ή Reported By: #security_warrior
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 28, 2022, 8:30pm (UTC)
XSS in Widget Review Form Preview in settings

πŸ‘‰ https://hackerone.com/reports/1595905

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #penguinshelp
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 29, 2022, 8:35am (UTC)
no rate limit in forgot password session

πŸ‘‰ https://hackerone.com/reports/1714970

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #irfadps
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: September 29, 2022, 6:17pm (UTC)