Bug Bounty

Wed
21
Oct

Microsoft starts .NET Core & ASP.NET Bug Bounty Program

Microsoft Corporation starts .NET Core & ASP.NET Bug Bounty Program

Today Microsoft Corporation expanded their Bug Bounty Program and it now covers also vulnerabilities in .NET Core CLR and ASP.NET 5. The program begins October 20, 2015, and ends on January 20, 2016. Microsoft published a new rewards list, higher payouts are possible, at Microsoft’s sole discretion, based on entry quality and complexity. 

Fri
09
Oct

PayPal Inc Bug Bounty #117 - Filter Bypass & Remote Session Fixation Vulnerability

PayPal Bug Bounty #117 - Bypass & Remote Session Fixation Vulnerability

The Vulnerability Laboratory Core Team member Hadji Samir discovered a session fixation web Vulnerability (EIBBP-31983)[P2] in the official PayPal Inc online service web-application. The vulnerability allows remote attackers to manipulate user session information to takeover the data for malicious purpose.

Data enters a web application through an untrusted source, most frequently an HTTP request. The data is included in an HTTP response header sent to a web user without being validated for malicious characters. HTTP response splitting is a means to an end, not an end in itself. At its root, the attack is straightforward: an attacker passes malicious data to a vulnerable application, and the application includes the data in an HTTP response header. The security risk of the  session fixation web vulnerability is estimated as medium. (CVSS 4.3)

Pages

Subscribe to RSS - Bug Bounty