Skip to content

Commit

Permalink
Improper-markup-sanitization: add bounty info
Browse files Browse the repository at this point in the history
I initially thought of not dislosing it, but now I think that
that information could be valuable by itself.
  • Loading branch information
ChALkeR committed May 10, 2018
1 parent 7d23d8c commit a1a1901
Showing 1 changed file with 14 additions and 0 deletions.
14 changes: 14 additions & 0 deletions Improper-markup-sanitization.md
Original file line number Diff line number Diff line change
Expand Up @@ -491,4 +491,18 @@ Updated with Bitbucket XSS disclosure: 2017-06-26 15:40 UTC. \
Updated with Vanilla Forums disclosure: 2018-01-08, 20:50:00 UTC. \
Updated with YouTrack disclosure: 2017-04-25, 9:34 UTC.
---
Of all the mentioned parties, GitHub provided a monetary [bounty](https://bounty.github.com/researchers/ChALkeR.html) for the vulnerability report.
_(Thanks, GitHub)!_
Interestingly, the products that suffered the most serious form of the vulnerability here (i.e. arbitrary JavaScript code in XSS) —
namely [Bitbucket](#bitbucket), [YouTrack](#youtrack), [Upsource](#upsource) — were all closed-source and all did not have any bug
bounty program and did not provide monetary rewards.
_There might be some correlation there and perhaps there is even some lesson, but I don't want to write it down here, so guess yourself._
If you want to support me so that I would be able to keep doing what I am doing, consider supporting me on [Patreon](https://www.patreon.com/ChALkeR).\
Current supporters are listed on my [fundraising](https://github.com/ChALkeR/fundraising#personal-fundraising) page.
If you have any questions to me, contact me over Gitter ([@ChALkeR](https://gitter.im/ChALkeR)) or IRC (ChALkeR@freenode).

0 comments on commit a1a1901

Please sign in to comment.