![]() |
|
HackerOne Disclosed Reports - 2025-03-06 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-03-06 (/Thread-HackerOne-Disclosed-Reports-2025-03-06) |
HackerOne disclosed reports - 2025-03-06 - hashXploiter - 03-07-2025
Critical
resolved Sale cancellations from other sellers without restrictionsBug reported by capablanca was disclosed at March 6, 2025, 7:52 pm | Insecure Direct Object Reference (IDOR) The summary is as follows:
Low
resolved Exposing debug.log file leads to server full path disclosureBug reported by Mahmoud Khaled was disclosed at March 6, 2025, 2:02 pm | Information Disclosure
Critical
resolved SQLi | in URL pathsBug reported by mmakingdom was disclosed at March 6, 2025, 11:54 am | SQL Injection A SQL Injection vulnerability was discovered in the customerId parameter of the URL path. The vulnerability was demonstrated by adding a single quote to the customerId parameter, which resulted in an error message indicating that the application was vulnerable to SQL injection attacks. Tools such as SQLmap were used to confirm the vulnerability and gain access to the database. |