bug-chaining

5 articles
sort: new top best
clear filter
0 5/10

A security researcher discovered three race conditions in a review system that could be chained together to manipulate the entire system starting from a single free account, demonstrating how low-severity bugs can be combined into high-impact exploits.

medium.com · Sreejihkn · 11 hours ago · details
0 7/10

A bug bounty writeup demonstrating how multiple vulnerabilities (CORS misconfiguration, open redirect, XSS, session non-invalidation, and logical bugs) were chained together to achieve full account takeover and steal user data including email addresses, discount codes, and purchase history.

Mashoud1122 HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 7/10

A race condition vulnerability in a web application's file upload feature allowed RCE by exploiting a 2-second window where uploaded files were stored locally before being moved to S3. The modify.php endpoint lacked extension filtering present in upload.php, enabling PHP shell upload followed by rapid re-requests to execute the file during the local storage window before S3 migration.

YoKo Kho Faisal Yudo Hernawan Tomi Amazon S3 upload.php modify.php
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 9/10

A researcher escalated a self-XSS vulnerability on Uber's Partners portal into a cross-user XSS attack by chaining three separate issues: leveraging missing CSRF protection in the OAuth login flow and logout endpoint, combined with CSP manipulation and iframe-based session hijacking to execute arbitrary JavaScript in a victim's context and exfiltrate sensitive data.

Uber partners.uber.com login.uber.com fin1te
whitton.io · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 4/10

A bug bounty writeup demonstrating a vulnerability chain: exploiting a partial CSRF vulnerability (a 6-digit ID parameter preventing full CSRF) combined with reflected XSS to ultimately achieve complete CSRF and stored XSS by extracting the ID value via JavaScript and forging a complete CSRF payload.

Mandeep Jadon Burp
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details