📜 ⬆️ ⬇️

A 17-year-old teen published 0day XSS at PayPal after he was denied a reward.

Robert Kugler, a 17-year-old student from Germany who is interested in computer security, found a vulnerability on paypal.com, and decided to report it as part of a reward program for bugs found. However, he was refused because he is under 18 years old. In response to this, he posted a vulnerability on seclists.org . Here is what he writes:

Hello all!

I'm Robert Kugler a 17 years old German student who's interested in
securing computer systems.
')
I would like to be cross-site
Scripting vulnerability!
PayPal Inc. is running a bug bounty program for professional security
researchers.

www.paypal.com/us/webapps/mpp/security/reporting-security-issues

XSS vulnerabilities are in scope. I have tried
to PayPal Site Security.

The vulnerability is located in the search function and can be triggered.
with the following javascript code:

'; alert (String.fromCharCode (88,83,83)) //'; alert (String.fromCharCode (88,83,83)) // ";
alert (String.fromCharCode (88,83,83)) // "; alert (String.fromCharCode (88,83,83)) // -
</ SCRIPT> "> '> <SCRIPT> alert (String.fromCharCode (88,83,83)) </ SCRIPT>

www.paypal.com/de/cgi-bin/searchscr?cmd=_sitewide-search

Screenshot: picturepush.com/public/13144090

Unfortunately PayPal disqualified me payment
because of being 17 years old ...

PayPal Site Security:

“To be eligible for the Bug Bounty Program, you * must not *:
... Be less than 18 years of age. If PayPal discovers that a researcher does
PayPal will remove that researcher from
the Bug Bounty Program and disqualify them from receiving any bounty
payments. "

I don’t want to pay
you are not interested in security
researchers ...

Best regards,

Robert Kugler


By the way, such programs from Mozilla and Google allow you to receive remuneration to participants under the age of 18, with the consent of the parents.

Source: https://habr.com/ru/post/181013/


All Articles