![]() |
|
HackerOne Disclosed Reports - 2025-05-06 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-05-06 (/Thread-HackerOne-Disclosed-Reports-2025-05-06) |
HackerOne disclosed reports - 2025-05-06 - hashXploiter - 05-07-2025
Low
resolved HTML Injection in LinkedIn Premium Support ChatBug reported by atul nagaraj was disclosed at May 7, 2025, 7:53 am | The vulnerability exists in the LinkedIn Premium support chat interface where unsanitized HTML input was rendered directly in the chat window. An attacker could have exploited this by injecting malicious HTML such as clickable links, potentially leading to phishing or redirection attacks on LinkedIn support staff. The observed behavior was that HTML, such as `` tags, was rendered in the chat and appeared clickable to support agents. The expected behavior was that user input in chat should have been sanitized and rendered as plain text without interpreting any HTML or tags.
Medium
resolved BAC – Bypass chatbot restrictions via unauthorized mention injectionBug reported by _dha was disclosed at May 6, 2025, 2:24 pm | The Gemini chatbot was found to have a vulnerability that allowed unauthorized users to bypass permission restrictions and interact with the chatbot. The vulnerability was discovered when a user manually edited the request by changing the "mention" and "configurationId" fields, which allowed them to communicate with the disabled Gemini chatbot despite not having the proper permissions. |