Hacking, AppSec, and Bug Bounty newsletter
2017-12-06 | ICQ Opsec blunder, Mailsploit, and 31 million records leaked via Ai.Type
Wednesday, December 6
Server Side Request Forgery on JSON Feed [5 upvotes] - no bounty for this report to Infogram by @mrreboot.
Nested attributes reject_if proc can be circumvented by providing "_destroy" parameter [5 upvotes] - $500 bounty for this report to Ruby on Rails by @jcoyne.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
Mailsploit: Collection of bugs in email clients that allow effective sender spoofing and code injection attacks
31 Million Client Registration Files Leaked by Personalized Keyboard Developer, Ai.Type
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: firstname.lastname@example.org
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The trick resides in using RFC-1342 (from 1992!), a recommendation that provides a way to encode non-ASCII chars inside email headers in a such way that it won't confuse the MTAs processing the email.