Skip to main content

Top Vulnerability Reports of Third Quarter, 2016

  • October 28th , 2016

The Preferred State of Vulnerabilities

It’s time for the third installment of Top 5 Vulnerability Reports on HackerOne.

What a quarter! We sweated through the Vegas conferences, Hacked the World and held a jammed AMA on Reddit. Our hackers crossed the $10,000,000 mark of bounties earned. Best of all, our fantastic hackers helped companies find great vulnerabilities like the ones below.

Instead of listing the raw top five, we looked at the best five, non-repeat, non-summarized vulnerabilities of the quarter to share. Detailed vulnerabilities are the most instructive, so that’s why we highlight them here.

The Top 5 Vulnerability Reports of Third Quarter, 2016:

  1. Mongo investigated Uber passwords via their passwordless signup features. Uber fixed it in a day (Mongo confirmed it) and paid out $10,000. In Uber’s words, “Thanks for the great find @mongo!”. We’re very glad to have Mongo hacking for HackerOne.

  2. A frequent reporter in this blog series, orange knows how not to waste a trip. In this case to China, where a .cn domain of Uber’s was found to have a SQL Injection vulnerability when investigating an unsubscribe link closely. The report earned a nice $4,000.

  3. Paragonie-Scott is one of the most vocal security team leaders on HackerOne. Read his reaction to this oddball .svg report that reminds us that .svg is not like other image file formats. It allows arbitrary code execution by design. Abdullah received the largest-ever bounty from the Paragon program, not to mention over 3,500 pageviews and counting.

  4. We see lots of phrases like “This is probably not a big deal…” in initial hacker reports. Modest hackers! This report Subdomain takeover on http://fastly.sc-cdn.net/ began that way. Ebrietas started with an outdated DNS record and ended with a $3,000 bounty payment. Thanks for preventing users from potentially being served false content.

  5. Egypt’s secgeek reported Html Injection and Possible XSS in sms-be-vip.twitter.com to Twitter. The vulnerability, which affected the latest versions of Internet Explorer, could have allowed injection of html tags and Javascript execution. At HackerOne, we particularly like the professional, polite disagreement and resolution that came up along the way to a $420 reward. Nice find!

Do you see vulnerabilities you think were instructive or otherwise awesome? You can vote here to highlight the best on the top of the Hacktivity page.

Want to appear here next quarter? Hack on! Or invite your own hackers like the companies here did. As I once read, every organization needs a bug bounty program!

Rajesh F. Krishnan

Recent articles

H1-415 Hackathon Delivers to Customers, Community, and Hackers

Just a few short weeks ago, an elite group of hackers huddled in conference rooms in a San Francisco high-rise…

Introducing CWE-based Weaknesses

HackerOne updated their vulnerability taxonomy to include a more complete weakness suite based on the industry-…

Intel launches its first bug bounty program

Our friends at Intel have an exciting announcement! Their bug bounty program is live.