Full Disclosure mailing list archives
Re: PayPal.com XSS Vulnerability
From: Jeffrey Walton <noloader () gmail com>
Date: Mon, 27 May 2013 19:31:41 -0400
Hi Robert,
Unfortunately PayPal disqualified me from receiving any bounty payment because of being 17 years old...
Interesting. The Bug Bounty page (https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues) does not state there's an age restriction or minimum. It appears PayPal is sending the message that its best to sell the bug privately, rather than participate in responsible disclosure (despite what their Bug Bounty page states). Has anyone written about the issue? For example, an established researcher? I'd like to see homage paid on PayPal's wikipedia page (wikipedia has some rules about citing sources, so the person writing would have to meet criteria). Sorry to hear about the crappy treatment. Jeff On Fri, May 24, 2013 at 12:38 PM, Robert Kugler <robert.kugler10 () gmail com> wrote:
Hello all! I'm Robert Kugler a 17 years old German student who's interested in securing computer systems. I would like to warn you that PayPal.com is vulnerable to a Cross-Site Scripting vulnerability! PayPal Inc. is running a bug bounty program for professional security researchers. https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues XSS vulnerabilities are in scope. So I tried to take part and sent my find to PayPal Site Security. The vulnerability is located in the search function and can be triggered with the following javascript code: ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--</SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>https://www.paypal.com/de/cgi-bin/searchscr?cmd=_sitewide-search Screenshot: http://picturepush.com/public/13144090 Unfortunately PayPal disqualified me from receiving any bounty payment because of being 17 years old... PayPal Site Security: "To be eligible for the Bug Bounty Program, you must not: ... Be less than 18 years of age.If PayPal discovers that a researcher does not meet any of the criteria above, PayPal will remove that researcher from the Bug Bounty Program and disqualify them from receiving any bounty payments." I don’t want to allege PayPal a kind of bug bounty cost saving, but it’s not the best idea when you're interested in motivated security researchers... Best regards, Robert Kugler
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- PayPal.com XSS Vulnerability Robert Kugler (May 25)
- Message not available
- Re: PayPal.com XSS Vulnerability Robert Kugler (May 27)
- Message not available
- Re: PayPal.com XSS Vulnerability Jeffrey Walton (May 27)
- Re: PayPal.com XSS Vulnerability Dan Kaminsky (May 28)
- Re: PayPal.com XSS Vulnerability Jeffrey Walton (May 28)
- Re: PayPal.com XSS Vulnerability Daniël W . Crompton (May 28)
- Re: PayPal.com XSS Vulnerability Zachary Cutlip (May 28)
- Re: PayPal.com XSS Vulnerability Kirils Solovjovs (May 28)
- Re: PayPal.com XSS Vulnerability Jeffrey Walton (May 28)
- Re: PayPal.com XSS Vulnerability Terrence (May 28)
- Re: PayPal.com XSS Vulnerability Kirils Solovjovs (May 28)
- <Possible follow-ups>
- Re: PayPal.com XSS Vulnerability Robert Kugler (May 28)