Best Quality
0 6/10

A blind time-based SQL injection vulnerability was discovered in a file upload parameter where the application stored the filename directly in the database without proper sanitization. The vulnerability was exploited by injecting SQL sleep commands into the PDF filename and confirming exploitation through response time analysis after bypassing a Cloudflare WAF misconfiguration.

Synack HackerOne Cloudflare Burp Scanner reefbr marcioalm joaomatosf CVE-2019-2725
jspin.re · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A walkthrough of exploiting a boolean-based SQL injection vulnerability via the User-Agent HTTP header to enumerate database version, table names, and columns, culminating in credential extraction from a MariaDB 10.1.21 instance.

MariaDB MySQL Oracle MicrosoftSQL fr0stNuLL
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A bug bounty hunter demonstrates a union-based SQL injection attack against a private company's web application, using order-by enumeration to identify 11 vulnerable columns, extracting database version, user, OS details, and dumping table schemas via information_schema queries with encoding bypasses.

Nur A Alam Dipu
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A subdomain takeover vulnerability in flock.co where newdev.flock.co was pointed to an unclaimed readme.io custom domain, allowing the attacker to register a readme.io project and claim the subdomain through misconfigured DNS CNAME records without ownership verification.

flock.com flock.co newdev.flock.co readme.io cname.readme.io
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

SQL injection vulnerability discovered in a forget password function via time-based exploitation. The author enumerated the backend technology (ASP.NET/MSSQL), broke the SQL query with single quotes, injected a WAITFOR DELAY payload to confirm the vulnerability, and used SQLMap to automate database extraction.

SQLMap Burp Suite ASP.NET MSSQL khaled gaber
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Researcher demonstrates a subdomain takeover vulnerability on Starbucks by exploiting an unclaimed Azure Traffic Manager endpoint. The vulnerable subdomain had a CNAME pointing to a non-existent trafficmanager.net domain that could be registered without domain ownership verification, allowing complete control of the subdomain.

Starbucks Microsoft Azure Azure Traffic Manager wfmnarptpc.starbucks.com s00149tmppcrpt.trafficmanager.net Patrik Hudak
0xpatrik.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

An IDOR vulnerability in Facebook Analytics allows users with analyst roles to access private dashboard charts by manipulating the 'chartID' parameter in a GraphQL request, disclosing chart names and data that should only be visible to the dashboard owner.

Facebook Analytics Sarmad Hassan CVE not assigned
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A security researcher bypassed 2FA/OTP on an Indian travel service provider by brute-forcing a 4-digit OTP without rate limiting, using Burp Suite's intruder to test all 10,000 possible combinations and obtain a valid login token.

Akash Agrawal Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A security researcher demonstrates how chaining a self-XSS vulnerability with clickjacking (UI redressing) can lead to session hijacking by exploiting missing X-Frame-Options headers to trick users into dropping malicious JavaScript that exfiltrates their cookies.

Armaan Pathan InfoSec Write-ups HackerOne Bugcrowd Rahul Maini
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A reflected XSS vulnerability was discovered in a private program where URL parameters prefixed with 'utm_' were reflected without encoding in a JavaScript context. The breakthrough came from fuzzing parameter names themselves rather than values—specifically injecting JavaScript payload directly into the parameter name (e.g., 'utm_foobarbaz\')<>') which bypassed encoding applied to parameter values.

Rahul Maini
noob.ninja · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A writeup demonstrating exploitation of JSON CSRF vulnerability by bypassing anti-CSRF token validation through method override technique, converting a PUT request with token validation to a POST request that accepts method override headers.

medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Researcher discovered a reflected XSS vulnerability on Yahoo Finance mobile version by bypassing a filter that converted payloads to uppercase, using HTML character encoding (&#97;&#108;&#101;&#114;&#116;) to obfuscate the alert function and execute JavaScript.

yahoo.com finance.yahoo.com Samuel @saamux
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Security researcher discovered an authentication bypass on springboard.google.com that escalated to local file inclusion (LFI) on Google production servers, allowing reading of /proc files with admin privileges. The vulnerability was found through directory enumeration and subsequently patched; the researcher received a $13,337 bounty.

Google VRP springboard.google.com cloudsearch.google.com Omar Espino wfuzz domained masscan SecLists ESCAL8
omespino.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A writeup demonstrating how combining Self-XSS with CSRF vulnerability can be chained together to achieve Stored XSS. The attacker used CSRF to force a victim to change their profile name to malicious JavaScript payload, which executes when the victim or other users view the profile, bypassing the Self-XSS limitation through CSRF form submission.

Renwa Burpsuite XSSHunter xshunter.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Google Docs lacks X-Frame-Options headers, allowing attackers to embed the voice typing feature in iframes on arbitrary sites and trick users into granting microphone access to record private conversations. The vulnerability was awarded a $2,337 bounty by Google.

Google Docs Raushan Raj Google VRP
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A researcher discovered a CSRF vulnerability in an e-commerce website where the form_key token lacked server-side validation, allowing attackers to add arbitrary addresses to victim accounts by removing the token from a PoC payload. The finding earned a $500 bounty.

Rajesh Ranjan Bugcrowd form_key
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A researcher discovered a stored XSS vulnerability on a payment processing form by bypassing input filters that blocked angle brackets and parentheses. The payload used HTML event attributes (OnMouseOver) with backtick-based function calls to execute JavaScript when a user interacts with the input field.

Prial Islam Khan
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A researcher discovered a CSRF protection bypass on IBM's account management endpoint by exploiting Referer header validation. The vulnerability allowed changing user email addresses via GET requests using a path traversal technique (hosting the IBM URL as a path on an attacker's domain) to bypass Referer checks.

IBM Mohamed Sayed
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A security researcher exploited missing X-FRAME-OPTIONS headers on API endpoints that exposed sensitive user data (credit card, email, address) by creating a clickjacking attack that tricked users into copying and pasting API responses via an invisible iframe, earning $1800 in bug bounty rewards.

Osama Avvan Bugcrowd
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A stored XSS vulnerability in a HackerOne program where a refclickid URL parameter is unsanitized and stored in Set-Cookie headers, then later reflected in JSON responses within script tags, allowing attackers to inject arbitrary JavaScript that executes on victim browsers.

Arbaz Hussain HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Researcher discovered a clickjacking vulnerability on Binary.com's ticktrade subdomain that lacked X-Frame-Options protection, then bypassed the initial JavaScript frame-busting patch by using HTML5 sandboxed iframes with permissive attributes (allow-scripts, allow-forms, allow-same-origin) to prevent top-level navigation while maintaining script execution.

Binary.com Binary Ltd ticktrade.binary.com Ameer Assadi
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A researcher discovered a chain vulnerability in a third-party OneDrive integration by exploiting loose redirect_uri path validation in OAuth flow combined with a CSRF-enabling testCallback API endpoint, allowing theft of authorization codes and access tokens without user consent.

OneDrive Microsoft Live Login HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

Reflected XSS vulnerability in Microsoft SharePoint's Follow feature (CVE-2017-8514) where the SiteName GET parameter is unsanitized and reflected into a JavaScript function call context, allowing attackers to break out of single quotes and inject arbitrary code via payloads like '-confirm("Xss")-'.

CVE-2017-8514 Microsoft SharePoint Adesh Kolte Microsoft
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A CSRF vulnerability in Microsoft's Service Trust Portal allowed unauthorized addition of user roles due to missing CSRF token validation on the AddUserRole endpoint. The researcher successfully exploited this to add users with arbitrary roles and received a $500 bounty.

Microsoft Service Trust Portal Adesh Kolte SecureLayer7 Microsoft Security Response Center
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A CSRF bypass technique that chains cross-frame scripting with CSRF by exploiting a server behavior where removing the CSRF token from a request causes the server to echo back form values with a new valid token, which can then be submitted via clickjacking to execute unauthorized actions.

HackerOne Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A bug bounty researcher discovered LDAP injection vulnerability in a registration form while attempting blind XSS exploitation. The server was passing unsanitized user input directly to LDAP directory operations, revealed through error messages about invalid directory pathnames.

XSS Hunter The WebApplication Hacker's Handbook Davide Tampellini
nc-lp.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

CVE-2017-5244 is a CSRF vulnerability in Metasploit Express, Community, and Pro editions (versions < 4.14.0) that allows attackers to stop all running tasks by tricking authenticated users into loading a malicious page, due to improper validation of anti-CSRF tokens and the use of GET requests for state-changing operations. The vulnerability was patched by enforcing POST-only requests with CSRF token validation.

CVE-2017-5244 Metasploit Rapid7 Mohamed A. Baset Seekurity Samuel Huckins
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A stored iframe injection vulnerability in a discussion forum was chained with a CSRF vulnerability in the email change feature to achieve account takeover of admin users. By injecting an iframe pointing to an attacker's server hosting a CSRF payload, viewing the forum automatically triggers the email change request from the victim's browser.

Rounak Dhadiwal Burp Collaborator PortSwigger AWS
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A clickjacking vulnerability in Telegram's web client allowed attackers to bypass frame-busting protections using sandboxed iframes and block CSS stylesheets via MITM attacks, enabling account compromise and unauthorized message sending. The vulnerability was fixed by Telegram implementing proper X-Frame-Options headers.

Telegram Mohamed A. Baset Seekurity Pavel Durov
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
0 6/10

A clickjacking vulnerability in Facebook's AJAX endpoint (/ajax/home/generic.php) allowed attackers to iframe a resource lacking X-Frame-Options headers and submit forms to trick victims into adding the attacker to secret groups or performing other unwanted actions on Facebook resources.

Facebook Mohamed A. Baset Seekurity
seekurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 9 hours ago · details
more →