![]() |
|
HackerOne Disclosed Reports - 2025-02-26 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-02-26 (/Thread-HackerOne-Disclosed-Reports-2025-02-26) |
HackerOne disclosed reports - 2025-02-26 - hashXploiter - 02-27-2025
High
resolved Stored XSS via Post Tittle Enabling Non-Privileged User to Privileged User Exploitation on https://forums.autodesk.com/Bug reported by Manojkumar J was disclosed at February 26, 2025, 6:24 pm | Cross-site Scripting (XSS) - Stored A stored cross-site scripting (XSS) vulnerability was found on Autodesk Forums. The vulnerability allowed an attacker to inject malicious JavaScript code when viewed by both non-privileged and privileged users. The vulnerability was fixed by Autodesk.
Medium
resolved Non-Production API Endpoints for the Datazone Service Fail to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at February 26, 2025, 3:00 pm | Insufficient Logging The vulnerability found in the Datazone service allows an adversary to enumerate permissions of compromised credentials without logging to CloudTrail. Forty-four non-production endpoints were identified that can be accessed using standard IAM credentials and do not generate CloudTrail logs. This vulnerability was reported to AWS as a security issue, as it enables silent permission enumeration.
Low
resolved Unsufficent input verification leads to DoS and resource consumptionBug reported by Tinine was disclosed at February 26, 2025, 6:58 am | Uncontrolled Resource Consumption The vulnerability affects the API endpoint at api.sorare.com/api/v1/users/, where insufficient input verification of the email parameter was discovered. This allowed an attacker to submit an excessively long email, causing the server to become unresponsive and return a 503 Service Unavailable error. No further details on potential impacts were provided.
Critical
resolved Account Takeover via Password Reset without user interactionsBug reported by Asterion was disclosed at February 26, 2025, 6:29 am | Improper Access Control - Generic The report submitted to GitLab described a vulnerability that allowed account takeover via the password reset form. The vulnerability was triggered by modifying the JSON request to include the victim's email along with the attacker's email. This resulted in the password reset email being sent to both emails, allowing the attacker to access the victim's account by using the reset link. |