bug-bounty

500 articles
sort: new top best
clear filter
0 3/10

A researcher discovered a reflected XSS vulnerability in a login redirect parameter that could steal user credentials by injecting malicious JavaScript to extract email and password field values. The attack chain involved chaining an open-redirect vulnerability with XSS to trick victims into executing credential-stealing payloads.

HackerOne mehulpanchal007
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10
vulnerability

A stored XSS vulnerability was discovered on Edmodo's library feature where folder names were not properly sanitized, allowing an attacker to inject malicious JavaScript payloads that execute when the folder is accessed.

Edmodo Rohit Verma
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10

Reflected XSS vulnerability found in eBay's search parameter (LH_SpecificSeller) in 2013 that bypassed character filtering by using CSS expression payloads within a hidden span, exploitable only in Internet Explorer due to CSS expression support.

eBay Sukhmeet Singh Internet Explorer
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 3/10

A stored XSS vulnerability was discovered on Microsoft's TechProfile platform where unsanitized user input in profile fields could execute arbitrary JavaScript in victims' browsers, potentially leading to account takeover and privilege escalation. The vulnerability was reported on April 28, 2019 and patched by May 8, 2019.

Mohammad Ali Syarief Microsoft Learn techprofile.microsoft.com OTG-INPVAL-002
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 6/10

Researcher discovered multiple stored and blind XSS vulnerabilities in Skype's management interface (manager.skype.com and secure.skype.com) via unsanitized group_name parameters. By making users group admins or sending malicious invite links, attackers could execute JavaScript to steal cookies, device information, and IP addresses, leading to potential account takeover.

Jayateertha Guruprasad manager.skype.com secure.skype.com Microsoft xsshunter CVE (none mentioned)
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 6/10

A researcher escalated a self-XSS vulnerability into a reflected XSS by encoding a payload within a QR code that users could scan during a wallet transfer function, bypassing the need for manual input and triggering automatic payload execution.

HackerOne Hein Thant Zin
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 6/10

A stored XSS vulnerability was discovered in Zendesk's macro description field that could be exploited by bypassing the WAF by entering a benign value initially, then editing the field to insert the malicious payload after creation. The vulnerability was confirmed with an image onerror payload that triggered on the homepage.

Zendesk Hariharan S P5YCH0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10

First-time bug bounty hunter discovered XSS vulnerability on a Sony sandbox subdomain (authtry.dev2.sandbox.dev.ppf.sony.net) through subdomain enumeration using crt.sh, assetfinder, and httprobe, then exploited parameter injection on the target's index.php with a classic XSS payload.

Sony ppf.sony.net authtry.dev2.sandbox.dev.ppf.sony.net crt.sh assetfinder httprobe dirsearch Gökhan Güzelkokar
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10

Security researcher discovered an XSS vulnerability on Twitter's dev subdomain by chaining a 302 redirect parsing inconsistency with URL fuzzing to inject javascript:alert() payloads via href attributes, earning a $1120 bounty. The exploit bypassed Twitter's previous fixes by abusing differences in how location headers and HTML link parsing handle malformed URLs with port numbers and special characters.

Twitter Bywalks bobrov dev.twitter.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 1/10

A bug bounty hunter reports bypassing XSS protection on a HackerOne private program, but the actual article content is inaccessible (only Google cache metadata visible).

HackerOne bughunter.sec7
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 6/10

A researcher discovered a self-XSS vulnerability in a form field that was escalated to a working XSS attack against other users by exploiting the absence of X-Frame-Options/clickjacking protection, allowing payload injection via SVG onload handlers combined with a clickjacking POC.

HackerOne Arbaz Hussain
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 7/10

A researcher converted a self-XSS vulnerability into a stored/persistent XSS by chaining it with a CSRF vulnerability that allowed creating groups on behalf of other users, triggering the payload in a dialog box that lacked proper encoding.

Abhishek private.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 2/10

Researcher discovered a second stored XSS vulnerability on Edmodo by posting XSS payloads to poll functionality, which executed when accessing notifications on a different domain variant. The vulnerability was reported and rewarded within a week.

Edmodo ZishanAdThandar
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 7/10

Demonstrates bypassing uppercase character filters on XSS vulnerabilities using JsFuck obfuscation techniques to construct a fully functional payload that loads external JavaScript and escalates from Low to Critical severity on HackerOne.

jsfuck.com Martin Kleppe Burp Suite HackerOne WordPress Chrome jQuery
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10

A researcher discovered a stored XSS vulnerability in a web application's internal notification system by injecting HTML/SVG payloads into company names during user invitation functionality, which were then reflected without sanitization when users viewed invitation notifications.

Oleksandr Opanasiuk
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 7/10

Detectify researchers discovered a DOM-based XSS vulnerability on Tesla's forums (forums.tesla.com) in the CKEditor HTML insertion feature that bypassed the filter by crafting a malicious img tag payload with an onerror handler. The self-XSS, responsibly disclosed and fixed, allowed injection of arbitrary JavaScript to redirect the page to a hosted DOOM game.

Tesla forums.tesla.com CKEditor Detectify Linus Särud Fredrik Almroth vexal js-dos
labs.detectify.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10
bug-bounty

A DOM XSS vulnerability in an AJAX request where location.pathname is used unsanitized to construct a URL, allowing attackers to redirect requests to their own server and inject malicious content via protocol-relative URL manipulation (//attacker.com).

jinone.github.io · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
hacknpentest.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
CVE-2020-13487
hackerone.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 7/10

A stored XSS vulnerability in EspoCRM 5.6.8's email signature feature allowed attackers to steal authentication cookies via a polyglot XSS payload, enabling complete account takeover of any user including administrators. The vulnerability exploited inadequate input sanitization in the markdown code-view feature and lack of HttpOnly flags on session cookies.

CVE-2019-14546 EspoCRM EspoCRM 5.6.8 Gaurav Narwani Somdev Sangwan
gauravnarwani.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 6/10
bug-bounty

A bug bounty writeup covering three reflected XSS vulnerabilities discovered on a Synack program: one via JavaScript protocol in a referrer header parameter, one via password-check parameter bypass in account details modification, and one via insufficient input filtering in an email recovery parameter.

Gaurav Narwani Synack burp
gauravnarwani.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 5/10

Researcher discovered a reflected XSS vulnerability in Bugcrowd's main domain via an unvalidated 'locale' parameter that was ultimately traced to Locomotive CMS framework, affecting multiple websites using that CMS. The vulnerability allowed attackers to steal user data and perform CSRF actions from the main domain, earning a $600 bounty.

Bugcrowd Locomotive CMS WitCoat Security Bull
blog.witcoat.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
blog.it-securityguard.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
blog.it-securityguard.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
blog.it-securityguard.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0 2/10
bragging-post

Brief blog post about finding and reporting an XSS vulnerability on Oracle's education subdomain (education.oracle.com) that was eventually patched and acknowledged. No technical details about the vulnerability, exploitation, or root cause are provided.

Oracle Corporation education.oracle.com Shashank
blog.shashank.co · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 8 hours ago · details
0
bug-bounty
medium.com · Configx · 8 hours ago · details
0
bug-bounty
medium.com · Configx · 8 hours ago · details
0
bug-bounty
medium.com · Configx · 10 hours ago · details
more →