Bug Bounty

Thu
16
Jul

FoxyCart Bug Bounty #1 - Filter Bypass & Persistent API Vulnerability

FoxyCart (Bug Bounty) - Filter Bypass & Persistent API Vulnerability

This week an issue in the foxycart api has been patched due to the participation in the official bug bounty program. The security researcher and CEO Benjamin Kunz Mejri discovered an application-side input validation vulnerability in connection with a filter bypass issue.

The security vulnerability was located in the `comments` input field value of the `landing/white-glove-onboarding > Help Form` module. Remote attackers can exploit the issue to execute persistent malicious context in foxycart service mails.

The injection takes place in the help contact form POST method request with the vulnerable comments input value. The execution of the script code occurs on the application-side in the email body context. Attackers are able to inject iframes, img sources with onload alert or other script code tags. The service does not encode the input and has also no input restriction.

Thu
09
Jul

PayPal creates new Bug Bounty Portal

Paypal Logos

PayPal creates new Bug Bounty Portal for Security Researchers

Today in the morning the PayPal Inc Security Team published a letter via email to all active security researchers of the official bug bounty program.

Due to the eBay Inc and PayPal Inc separation, the eBay Bug Bounty portal will no longer be used to file new vulnerabilities effective July 2015.

PayPal has created a new Bug Bounty portal to file new PayPal vulnerabilities. This will require you to register and login using a new or existing PayPal accounts' login credentials. Instructions on how to register for the new portal will be sent out over email closer to the go live date and will also be available on the PayPal Bug Bounty Program page.

Pages

Subscribe to RSS - Bug Bounty