Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ HackerOne: Potential stored Cross-Site Scripting vulnerability in Support Backend

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š HackerOne: Potential stored Cross-Site Scripting vulnerability in Support Backend


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
HackerOne maintains an internal Support Backend system for employees. On the internal user profiles for hackers, a small overview is shown that lists the skills the user tagged their penetration tester profile with. Although the skills are currently managed by HackerOne and a user can only pick skills from a list, an XSS payload can be injected in the skill name to execute JavaScript in the backend system. In case we would allow penetration testers to enter their own skills in a free-form text format, it could lead to a stored Cross-Site Scripting vulnerability that is exploited by people outside of HackerOne. Proof of concept To reproduce, make sure your local environment is set up correctly by running the following code: ruby Skill.create! name: '<script>alert(/XSS/);</script>' User.find_by!(username: 'hacker').update! h1_pentester: true Next, authenticate as the hacker user and enable the pentester-profile feature. Go to http://localhost:8080/settings/pentests and create a penetration tester profile with the skill that was created earlier. When the profile is created successfully, sign in to the Support Backend at http://localhost:8080/support and navigate to http://localhost:8080/support/users/hacker. The XSS payload injected in the skill name will be executed. โ–ˆโ–ˆโ–ˆโ–ˆ Root cause The following code leads to two Cross-Site Scripting vulnerabilities: lib/support/app/controllers/support/tables/columns/pentester_profile_skills.rb ```ruby def render(record) return unless... ...



๐Ÿ“Œ HackerOne: Reflected XSS on www.hackerone.com and resources.hackerone.com


๐Ÿ“ˆ 37.81 Punkte

๐Ÿ“Œ HackerOne: Blind Stored XSS in HackerOne's Sal 4.1.4.2149 (sal.โ–ˆโ–ˆโ–ˆโ–ˆ.com)


๐Ÿ“ˆ 34.02 Punkte

๐Ÿ“Œ Shopware up to 5.1.4 Backend backend/Login/load/ privilege escalation


๐Ÿ“ˆ 25.84 Punkte

๐Ÿ“Œ Shopware bis 5.1.4 Backend backend/Login/load/ erweiterte Rechte


๐Ÿ“ˆ 25.84 Punkte

๐Ÿ“Œ HackerOne: Open Redirection in [https://www.hackerone.com/index.php]


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Password not checked when disabling 2FA on HackerOne


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne rewards bughunter who found critical security hole inโ€ฆ HackerOne


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Any user with access to program can resume and suspend HackerOne Gateway


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Hacker email disclosed on submission at hackerone hactivity


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Subdomain takeover of resources.hackerone.com


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Reflected XSS on www.hackerone.com via Wistia embed code


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: HackerOne Jira integration plugin Leaked JWT to unauthorized jira users


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: HackerOne Undisclosed Report Leak via PoC of Full Disclosure on Hacktivity


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: HTML injection that may lead to XSS on HackerOne.com through H1 Triage Wizard Chrome Extension


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Hackers two email disclosed on submission at hackerone hactivity


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Bypass of #2035332 RXSS at image.hackerone.live via the `url` parameter


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Takeover of hackerone.engineering via Github


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ HackerOne: Unreleased Hackerone Copilot is vulnerable to IDOR


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ StashCat on Android Backend Database Stored weak encryption


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ StashCat auf Android Backend Database Stored schwache Verschlรผsselung


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Support Board - Chat And Help Desk | Support & Chat <= 1.2.8 Stored XSS


๐Ÿ“ˆ 19.14 Punkte

๐Ÿ“Œ CVE-2016-2858 | QEMU PRNG Backend Support Entropy Request memory corruption (FEDORA-2016-38b20aa50f / Nessus ID 90036)


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ MPV 0.35 Released With PipeWire Backend, Wayland DMA-BUF Support


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ Wayland's Weston 12 Alpha Brings Multi-GPU Support, PipeWire Backend, Tearing Control


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ NetworkManager 1.6 to Support the systemd-resolved Local DNS Forwarder Backend


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ QEMU PRNG Backend Support Entropy Request Stack-Based Pufferรผberlauf


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ NetworkManager 1.6 to Support the systemd-resolved Local DNS Forwarder Backend


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ QEMU chardev Backend Support Use-After-Free Denial of Service


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ QEMU PRNG Backend Support Entropy Request Stack-Based Pufferรผberlauf


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ QEMU chardev Backend Support Use-After-Free Denial of Service


๐Ÿ“ˆ 18.08 Punkte

๐Ÿ“Œ Introducing Unified HackerOne Scope Management with Burp Suite Support


๐Ÿ“ˆ 17.76 Punkte

๐Ÿ“Œ HackerOne: Support Tickets can be created on behalf of other users using spoofed email | Bypass of #2001913


๐Ÿ“ˆ 17.76 Punkte











matomo