uber

4 articles
sort: new top best
clear filter
0 6/10

Researcher discovered a wildcard subdomain takeover vulnerability on uber.design by identifying that the domain's wildcard DNS pointed to Heroku's unclaimed infrastructure, allowing registration of arbitrary subdomains (*.uber.design) and potential email spoofing via Google Workspace verification.

Uber HackerOne Heroku Google G-Suite Muhammad Khizer Javed uranium238
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 9/10

A researcher escalated a self-XSS vulnerability on Uber's Partners portal into a cross-user XSS attack by chaining three separate issues: leveraging missing CSRF protection in the OAuth login flow and logout endpoint, combined with CSP manipulation and iframe-based session hijacking to execute arbitrary JavaScript in a victim's context and exfiltrate sensitive data.

Uber partners.uber.com login.uber.com fin1te
whitton.io · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 2/10

A researcher discovered an XSS vulnerability on payment-providers.uber.com by using subdomain enumeration (Sublist3r), directory brute-forcing (dirb), and the KNOXSS tool, earning a $500 bounty that was later revoked for being on a non-browser-facing endpoint.

UBER KNOXSS Emad Shanab brutelogic Sublist3r aquatone dirb Rob Fletcher HackerOne payment-providers.uber.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

Researcher discovered a stored XSS vulnerability in Uber's invitation link feature by injecting a payload into the 'v' parameter, then bypassed the strict Content Security Policy by leveraging the whitelisted *.uber.com domain to load a malicious Marketo callback endpoint, resulting in a $2,000 bounty.

Uber partners.uber.com mkto.uber.com Marketo stamone Efkan HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details