![]() |
|
HackerOne Disclosed Reports - 2026-04-23 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2026-04-23 (/Thread-HackerOne-Disclosed-Reports-2026-04-23) |
HackerOne disclosed reports - 2026-04-23 - hashXploiter - 04-24-2026
High
resolved Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoSBug reported by mbarbs was disclosed at April 23, 2026, 10:21 pm | A flaw was discovered in the Node.js TLS error handling that left SNICallback invocations unprotected against synchronous exceptions. This represented an incomplete fix of the prior CVE-2026-21637 vulnerability, where the equivalent ALPN and PSK callbacks were already addressed. The issue could lead to a Remote Denial of Service when an SNICallback threw synchronously on unexpected input, causing the exception to bypass TLS error handlers and propagate as an uncaught exception, crashing the Node.js process.
Medium
resolved RBAC bypass on App log endpoints via `permissionRequired` typo — any authenticated user reads admin-only Enterprise App logsBug reported by Arccode was disclosed at April 23, 2026, 9:45 am | Improper Access Control - Generic
|