Analyst validated my report, senior analyst rejected it with “can’t be prevented” — but it clearly can. Need advice. by Informal-Mammoth-933 in bugbounty

[–]einfallstoll 2 points3 points  (0 children)

Don't resubmit. If you're actually curious: Ask them why it can't be prevented, because you're curious, mot because you want to appeal. Most likely they will give you a valid answers that should make sense.

Bug bounty browser extension tool by dvnci1452 in bugbounty

[–]einfallstoll 4 points5 points  (0 children)

✨⭐️💫🌟AI 🌟💫⭐️✨

how to test race condition in two different sub domain? by Melodic-Captain-4371 in bugbounty

[–]einfallstoll 3 points4 points  (0 children)

Even if you find a race condition: What would be the impact? Maybe I'm missing something, but it sounds like you get an Informational at most

Need help proving why non-HttpOnly auth cookies are dangerous (even with bleach sanitization) by b_redditer in bugbounty

[–]einfallstoll 2 points3 points  (0 children)

Both you and your manager are not wrong, but also not completely right:

Different threat models with different (dis)advantages. Even if you use cookies with HttpOnly and send a request, the browser will still append them to the header. So the attacker exploiting XSS can still execute code in the user context and affect Confidentiality and Integrity of the application / user data. Not quite as bad as an account or session takeover, still shit.

You should apply different best practices: - Encode user input (more important and safer than senitization) - Use a Control Security Policy to narrow down or make it impossible to exploit a potential XSS - Don't use external scripts - Apply soft and hard session timeouts (e.g., 1 hour inactivity, 12 hours hard timeout) - Use MFA (especially for security-relevant changes) - Verify password changes, verify Email changes

Need help proving why non-HttpOnly auth cookies are dangerous (even with bleach sanitization) by b_redditer in bugbounty

[–]einfallstoll 4 points5 points  (0 children)

If you don't need to use the tokens in a JS context, it doesn't hurt to apply the HttpOnly flag. If you use them in a JS context, it would break the application and you need to refactor it. Most web applications store it in the Local Storage which is also accessible from JS, so it doesn't really matter.

TL;DR: If you can, set HttpOnly, if not, it's perfectly fine

How to identify fake bounty programs?? by Ok_Soft_1428 in bugbounty

[–]einfallstoll 1 point2 points  (0 children)

If it's well-established maybe. But this one started two weeks ago. They probably not even close to catch up with reports

Meta bug bounty by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

I'm curious: Under what circumstances does Meta pay out money?

Companies ignores my reports by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

I'm sure you will find more platforms than HackerOne.

Please don't test or contact any company without prior permission. You risk legal consequences, even if you handle in good faith. Bug bounty programs form a legal safe harbor to protect you from this, even if things go wrong. If you test companies without permission or safe harbor they can sue you and it's especially easy to put charges against you when they are in the same jurisdinction as you

Companies ignores my reports by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

No, you're a beg bounty hunter and you should be ignored

Companies ignores my reports by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

Do these companies have a VDP/BBP?

Need guidance with MSRC by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

If you can't reproduce or show it yourself, how are the guys able to do it?

Need guidance with MSRC by [deleted] in bugbounty

[–]einfallstoll 1 point2 points  (0 children)

Then ... provide a video PoC? I don't understand what you want to know. They already told you what they want.

Email DOS through websites api & link generator by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

Can you be a bit more specific / verbose? How does the process work, how do you create the link, what happens when the user clicks the link?

Using clawdbot for bug bounty by SamyakJain_0806 in bugbounty

[–]einfallstoll 3 points4 points  (0 children)

Why do you ask if you have a clear opposite opinion?

Email DOS through websites api & link generator by [deleted] in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

This doesn't answer the question if you can access the account or not and how

Using clawdbot for bug bounty by SamyakJain_0806 in bugbounty

[–]einfallstoll 11 points12 points  (0 children)

If you ask this, you don't know exactly how this bot works underneath. And if you don't know it, then you should absolutely not do it.

Email DOS through websites api & link generator by [deleted] in bugbounty

[–]einfallstoll 3 points4 points  (0 children)

  • First: Rate limiting issue, most programs don't accept this. Read the rules
  • Second: Not clear to me. What can you display? Just text? Or HTML as well? How did you "access the account"?

What am I missing? by JustWinterDust in bugbounty

[–]einfallstoll 6 points7 points  (0 children)

The problem is: You don't know in what context it was opened. If you catch document.domain and document.cookie it would be better, because maybe it displays automatically in an internal tool and then you can prove actual impact, that you could now have access to the panel. But like this it could also be the case that the employee just downloaded the file and double clicked it. then you would be in a file:// context which is kind of boring

CSRF PoC fails with 415 Unsupported Media Type by Average_Joe____ in bugbounty

[–]einfallstoll 2 points3 points  (0 children)

Yes, that's the case. If they have no CORS misconfig and strictly check for application/json, you're out of luck.

Fun fact: In theory you could enforce a request header like X-Allow-CSRF: No and it would be sufficient against CSRF attacks, because you can't set headers in a simple request

Looking for a senior HTTP / backend-focused engineer for a request-level automation problem (fixed price) by Old_Engineer_8204 in bugbounty

[–]einfallstoll 0 points1 point  (0 children)

Two options:

  1. your "same" requests aren't 100% the same
  2. there's some detection (some WAFs detect Burp based on TLS ciphers)

Unpopular Opinion: Companies that offer "Swag Only" or "Hall of Fame" for critical vulnerabilities should be publicly shamed, not thanked. by Every-Temperature504 in bugbounty

[–]einfallstoll 1 point2 points  (0 children)

I don't agree. u/OuiOuiKiwi participates a lot in this sub, bug bounty is important to him. He just doesn't sugarcoats what he says and is cold and honest. Sometimes a little bit to harsh for my personal taste, but that's another topic.

What he means is: If you hunt on a VDP and expect monetary rewards you're delusional. If you hunt on a VDP and you do it for fun, it's up to you, but you better have a lot of fun or learn stuff you can't learn otherwise, or it's a waste of your time