1337day XSS!

Inj3ct0r

1337day had a reflective XSS bug and a HTML injection vulnerability. Anyhow according to my research done this was a browser dependent XSS meaning this could be only exploited in the Microsoft Internet Explorer browsers  only. By the way I also got mentioned in a blog : http://thehackersbay.org/2013/12/1337day-a-popular-exploit-database-has-been-affected-by-a-xss/

hash_pub pub

Reward was 10 gold. Thanks to r0073r 🙂

Charity Hero!

Yeah! I became a Charity hero in Bugcrowd.com for participating in a charity bounty which all the time and money was donated to Sclerosis Research Australia (MS) 🙂

I found 4 reflective XSS vulnerabilities bypassing filters under 4 domains.

charity

 

https://bugcrowd.com/Osanda_Malith

Acknowledged By Pocket

This time I went on hunting on GetPocket.com website. Withing few minutes I was able to find a reflective self XSS in the form where we add items under 2 parameters. For reporting this issue my name got published in the Thanks section.

http://getpocket.com/security

Untitled

Acknowledged by Ifixit

This week I wanted to hunt a bug in Ifixit.com. Well I was little interested in the search bar field. So I taught of fuzzing from there. It had a good filter to filter user input. But to my surprise I ended by bypassing the filter 🙂

My name got published in the Thanks section 😉

http://www.ifixit.com/Info/Responsible_Disclosure#Section_2013

hof

I am sorry that I cannot disclose my vector or any sensitive data from the website. This issue has been already verified and patched.

pub

 

Hmm… wait a sec for my bypassing I should be rewarded right? So here we go , got a nice t-shirt, some stickers and a cool Ifixit toolkit 😉

1492480_10202892524020737_1989531121_o

Thank you guys. This was really impressive.