HackerOne Disclosed Reports - 2025-02-26

0 Replies, 369 Views

Logo
High
resolved

Stored XSS via Post Tittle Enabling Non-Privileged User to Privileged User Exploitation on https://forums.autodesk.com/


Bug reported by Manojkumar J was disclosed at February 26, 2025, 6:24 pm   |   Cross-site Scripting (XSS) - Stored

A stored cross-site scripting (XSS) vulnerability was found on Autodesk Forums. The vulnerability allowed an attacker to inject malicious JavaScript code when viewed by both non-privileged and privileged users. The vulnerability was fixed by Autodesk.


Logo
Medium
resolved

Non-Production API Endpoints for the Datazone Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration


Bug reported by Nick Frichette (Datadog) was disclosed at February 26, 2025, 3:00 pm   |   Insufficient Logging

The vulnerability found in the Datazone service allows an adversary to enumerate permissions of compromised credentials without logging to CloudTrail. Forty-four non-production endpoints were identified that can be accessed using standard IAM credentials and do not generate CloudTrail logs. This vulnerability was reported to AWS as a security issue, as it enables silent permission enumeration.


Logo
Low
resolved

Unsufficent input verification leads to DoS and resource consumption


Bug reported by Tinine was disclosed at February 26, 2025, 6:58 am   |   Uncontrolled Resource Consumption

The vulnerability affects the API endpoint at api.sorare.com/api/v1/users/, where insufficient input verification of the email parameter was discovered. This allowed an attacker to submit an excessively long email, causing the server to become unresponsive and return a 503 Service Unavailable error. No further details on potential impacts were provided.


Logo
Critical
resolved

Account Takeover via Password Reset without user interactions


Bug reported by Asterion was disclosed at February 26, 2025, 6:29 am   |   Improper Access Control - Generic

The report submitted to GitLab described a vulnerability that allowed account takeover via the password reset form. The vulnerability was triggered by modifying the JSON request to include the victim's email along with the attacker's email. This resulted in the password reset email being sent to both emails, allowing the attacker to access the victim's account by using the reset link.


[Image: e72398fe92beda2aa80d0329e8b9f4febece7568.gif]



Users browsing this thread: 1 Guest(s)