Bugpoint – Telegram
Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣

Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Acronis True Image (Windows) does not validate server certificate on a TLS connection

👉 https://hackerone.com/reports/1056144

🔹 Severity: High | 💰 500 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 12:53pm (UTC)
Mishandling of hackerone clear background checks resulting in disclosure of other hacker's information

👉 https://hackerone.com/reports/1240162

🔹 Severity: Medium
🔹 Reported To: HackerOne
🔹 Reported By: #frozensolid
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 3:24pm (UTC)
Private program disclosure through notifications

👉 https://hackerone.com/reports/1234746

🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #sunil_yedla
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 6:42pm (UTC)
Partial report contents leakage - via HTTP/2 concurrent stream handling

👉 https://hackerone.com/reports/493176

🔹 Severity: Medium | 💰 2,500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #tomvg
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:07pm (UTC)
CVE-2020-3452 - unauthenticated file read on anyconnect.routematch.com

👉 https://hackerone.com/reports/1257100

🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Uber
🔹 Reported By: #0xprial
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:15pm (UTC)
Mattermost Server OAuth Flow Cross-Site Scripting

👉 https://hackerone.com/reports/1216203

🔹 Severity: High | 💰 900 USD
🔹 Reported To: Mattermost
🔹 Reported By: #shielder
🔹 State: 🟢 Resolved
🔹 Disclosed: August 6, 2021, 2:01pm (UTC)
Loading YAML in Java client can lead to command execution

👉 https://hackerone.com/reports/1167773

🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Kubernetes
🔹 Reported By: #j0v
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 12:41pm (UTC)
Virtual Data Room / Hide download on collabora is easy to bypass

👉 https://hackerone.com/reports/1194606

🔹 Severity: High | 💰 150 USD
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
Webauthn tokens are not removed on user deletion

👉 https://hackerone.com/reports/1202590

🔹 Severity: Medium
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
Local privilege escalation via insecure MSI file

👉 https://hackerone.com/reports/1071832

🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #twvyy3vyaw8k
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 7:11pm (UTC)
PII data Leakage through hackerone reports

👉 https://hackerone.com/reports/1256371

🔹 Severity: Low
🔹 Reported To: HackerOne
🔹 Reported By: #iamr0000t
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:03pm (UTC)
Tab nabbing in Hackerone inbox.

👉 https://hackerone.com/reports/1145563

🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #adhamsadaqah
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:20pm (UTC)
Password reset link not expiring after changing password in settings

👉 https://hackerone.com/reports/1288898

🔹 Severity: Low | 💰 250 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:58am (UTC)
Insecure Bundler configuration fetching internal Gems (okra) from Rubygems.org

👉 https://hackerone.com/reports/1104874

🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Basecamp
🔹 Reported By: #zofrex
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 7:12am (UTC)
Login session not expire

👉 https://hackerone.com/reports/1294231

🔹 Severity: Low | 💰 100 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 8:08am (UTC)
Password reset token leak on third party website via Referer header

👉 https://hackerone.com/reports/1177287

🔹 Severity: Medium
🔹 Reported To: UPchieve
🔹 Reported By: #n1had
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 3:20pm (UTC)
Acronis True Image 2021 (windows) does not validate server hostname on a login TLS connection

👉 https://hackerone.com/reports/1070533

🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:02pm (UTC)
Improper authorization on `/api/as/v1/credentials/` for Dev Role User with Limited Engine Access

👉 https://hackerone.com/reports/1218680

🔹 Severity: High | 💰 3,800 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)
[Swiftype] - Stored XSS via document field `url` triggers on `https://app.swiftype.com/engines/<engine>/document_types/<type>/documents/<id>`

👉 https://hackerone.com/reports/1245787

🔹 Severity: High | 💰 3,200 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)
Modify in-flight data to payment provider Smart2Pay

👉 https://hackerone.com/reports/1295844

🔹 Severity: Critical | 💰 7,500 USD
🔹 Reported To: Valve
🔹 Reported By: #drbrix
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 10:05pm (UTC)
Ratelimits do not apply to OCS DataResponse

👉 https://hackerone.com/reports/1214158

🔹 Severity: No Rating
🔹 Reported To: Nextcloud
🔹 Reported By: #lukasreschkenc
🔹 State: 🟢 Resolved
🔹 Disclosed: August 11, 2021, 9:14am (UTC)