![]() |
|
HackerOne Disclosed Reports - 2025-11-14 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-11-14 (/Thread-HackerOne-Disclosed-Reports-2025-11-14) |
HackerOne disclosed reports - 2025-11-14 - hashXploiter - 11-15-2025
Low
resolved Responsible disclosure - public S3 bucket exposing JSON/config filesBug reported by was disclosed at November 14, 2025, 7:25 pm | Information Disclosure A publicly listable S3 bucket was discovered, exposing various JSON and configuration files. The bucket listing and file metadata were retrievable without authentication.
Critical
resolved Authentication Token Theft via Open Redirect in Callback URL ParameterBug reported by Sle3pyHead was disclosed at November 14, 2025, 3:26 pm | Insufficiently Protected Credentials A vulnerability was identified in the email signup flow of a website that enabled authentication token theft through manipulation of the callback URL parameter. The vulnerability occurred when an attacker modified the callbackUrl parameter during the email signup process to point to an attacker-controlled domain. When a victim completed the email verification process by clicking the verification link, they were redirected to the malicious domain along with their authentication tokens. The redirection happened automatically as part of the normal signup flow. The vulnerability was caused by insufficient validation of the callback URL parameter and leveraged the trust users place in legitimate verification emails. |