I can send thousands of emails using a password reset endpoint of a private bug bounty program. There's also authentication bypass (I can register with any email I do not own e.g. elon@tesla.com).
It is usually a p2 since I wrote an exploit, I can use it as a mass scale attack. But they give it a p5 lol I really hate this
Hello hello,
I published new bug bounty writeup. Have a read. Please share and clap.
https://vijetareigns.medium.com/email-and-home-address-disclosure-using-unauthenticated-api-endpoint-worth-500-4a497ff0678c
Hey, so I have found a vulnerability on a website from HackerOne. The webapp basically helps its users to transfer crypto currency from one place to another.
The vulnerability allows a low level user on the team to view the crypto wallet addresses which were added by the admin of the team. Also, the vulnerability leaks billing details(PII-full name, street address, zip code, city etc.) of the admin in the same http response.
I reported the bug with a clear PoC. But the H1 triager closed this as an informative saying that there is no significant security impact of this bug.
It just went over my head that how exposing wallet addresses along with PII of an admin does not pose security impact. I am really stunned.
Can someone suggest me what should I do in this situation?
https://www.pluralsight.com/courses/advanced-web-application-penetration-testing-burp-suite
Читать полностью…Well this is privacy violation 😅
I also found similar things but they closed it as informative and they fixed it after closing it 😆 toxicity of bug bounty
P.S. the wallet addresses and the PII are hidden from the low level users on the frontend.
Читать полностью…Hello guys,
I just released a new Bugbounty writeup.
https://vijetareigns.medium.com/delete-account-functionality-helped-me-earn-250-21baa23c4034