wfuzz

1 article
sort: new top best
clear filter
0 7/10

Security researcher discovered a local file inclusion (LFI) vulnerability on Google's springboard.google.com by first identifying an authorization bypass through directory enumeration with wfuzz, then escalating it to read arbitrary files like /proc/self/environ on production servers with admin privileges. The initial auth bypass was rejected for reward, but the escalated LFI earned a $13,337 bounty after two months of coordination with Google's VRP program.

Google VRP springboard.google.com Omar Espino @omespino wfuzz domained masscan SecLists ESCAL8 Intigriti HackerOne
omespino.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details