web-security

9 articles
Sort: New Top Best
clear filter
0

A CORS misconfiguration on api.artsy.net allows attackers to exfiltrate authenticated user credentials and sensitive data (email, phone, authentication tokens, etc.) by hosting malicious JavaScript that exploits the overly permissive Access-Control-Allow-Credentials and Access-Control-Allow-Origin headers.

api.artsy.net MuhammadKhizerJaved GeekBoy HackerOne Bugcrowd Apple Google Facebook BlackHat MEA
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A security researcher discovered a CORS misconfiguration on a mobile app API that accepted arbitrary origins and included Access-Control-Allow-Credentials, allowing credential-based requests from attacker-controlled domains. Despite identifying the vulnerability, exploitation was limited due to high attack complexity (API only accessible in mobile app), though a proof-of-concept demonstrated the ability to exfiltrate sensitive account information when credentials were available in the browser.

Smaran Chand Bugcrowd Frida Burpsuite Firefox XMLHttpRequest
smaranchand.com.np · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A comprehensive writeup documenting multiple race condition vulnerabilities discovered across major platforms including Cobalt.io, Facebook, Mega, and Keybase, demonstrating how concurrent requests can bypass security controls for unauthorized financial transactions, account confirmations, and resource redemptions. The article includes detailed exploitation techniques and timelines of responsible disclosure across various bug bounty programs.

Josip Franjković Cobalt.io Facebook Mega.nz DigitalOcean Keybase Starbucks Medium LastPass LetsEncrypt HackerOne DefuseSec w3af BlueHat KITCTF
josipfranjkovic.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A researcher discovered a local file inclusion (LFI) vulnerability on Google's production servers at springboard.google.com through directory enumeration and authorization bypass, escalating from an initial auth bypass to full LFI with admin privileges, ultimately earning a $13,337 bounty from Google's Vulnerability Reward Program.

Omar Espino omespino Google springboard.google.com cloudsearch.google.com Google VRP wfuzz domained masscan SecLists ESCAL8 Intigriti HackerOne CVE-2024-1234
omespino.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability

A CSRF vulnerability in Facebook's Instagram Business Tools allowed attackers to execute arbitrary GraphQL mutations by crafting malicious URLs that leveraged the victim's authenticated access token, enabling unauthorized actions like creating posts with malicious content. The vulnerability exploited improper parameter handling in the /business/:id endpoint where user-controlled IDs were sent to the Graph API without proper CSRF protections.

Facebook Instagram business.instagram.com graph.facebook.com BusinessToolsEntrypoint.instagram BusinessStore.instagram SyncAddMutations
philippeharewood.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability

Site-wide CSRF vulnerability discovered on Messenger.com where CSRF token (fb_dtsg) validation was completely missing on multiple endpoints, allowing attackers to perform unauthorized actions like changing settings and removing users from group threads. The vulnerability affected all POST requests regardless of whether the token was modified, removed, or omitted entirely.

messenger.com Facebook @phwd @mazen160 fb_dtsg XMessengerDotComSettingsEditController
whitton.io · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 2/10

Article introduces brute-force attacks against web application authentication systems as part of a web security series. Limited technical detail available from snippet alone.

medium.com · Laibakashif · 15 hours ago · details
0 2/10

Cloudflare announced a new Account Abuse Protection service in Early Access designed to prevent fraudulent account takeover attacks from both automated bots and human attackers.

Cloudflare
blog.cloudflare.com · Jin-Hee Lee · 16 hours ago · details
0 5/10

A penetration test discovering an XSS vulnerability in a custom-built AI chatbot that can be exploited to achieve zero-click account takeover without user interaction.

infosecwriteups.com · Rahul Singh Chauhan · 1 day ago · details