Bitcoin Forum
May 26, 2024, 11:46:32 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Bug Bounty for my Home Server. Can only Pay in iota..$25 us  (Read 196 times)
Possum (OP)
Member
**
Offline Offline

Activity: 99
Merit: 11


View Profile WWW
December 08, 2019, 12:21:42 AM
 #1

Hi

I have my own homer server running from a Raspberry Pi.

I want to pay someone to fine any exploits on my site that gives them the ability to edit my site  I'll will pay $25 in iota only.

Joining the forums and making an edit is not an exploit. The same goes for the feed back page.

You must tell me how you did it.

This is a one off payment to the first person who edits my site and posts poof in this thread so I can correctly determine who is first.


Sorry Guys, I will try to pay more in future. I'm just testing the water.

Have fun. My site is....

http://udopage.com/






xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 11, 2019, 05:18:13 AM
Last edit: December 11, 2019, 07:29:29 PM by xsync000
 #2

Hi, good day. I can help you with that. For better dialogue contact me through discord.-
xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 11, 2019, 05:57:16 PM
 #3

Look

https://i.ibb.co/jTFhhV4/x.png
Possum (OP)
Member
**
Offline Offline

Activity: 99
Merit: 11


View Profile WWW
December 11, 2019, 06:05:00 PM
 #4

Wow.. Cool


thank You so much.  If its OK post your iota receive address here. Or PM it to me.

I'm ready to send you $25  American..

I don't do discord..

xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 11, 2019, 06:18:06 PM
Last edit: December 11, 2019, 06:32:58 PM by xsync000
 #5

Thank you very much! I wish we could have contact by some other means (discord, email, etc.) To give you detailed information about this.

Wallet IOTA: GRELNOAVDELGRVFFPXLGWWYWIGARGYZDHYKYUMNDDHWFZAVEBCOH9MQXBCEWEARCVEXVCSNQZNZVDHP CXJUYHOFROW
Possum (OP)
Member
**
Offline Offline

Activity: 99
Merit: 11


View Profile WWW
December 11, 2019, 06:45:11 PM
 #6

that's not a valid iota address. Its 91 characters long. Iota is 90

I do appreciate your help.

Ive taken my site down and would appreciate knowing what you did.

Its up to you but I want to share with many people how wonderful these coins are

and would like our interaction to be here.

I appreciate your need for privacy of tools and techniques.

Please try with another address. Its got to be an iota address.

Thank You..
xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 11, 2019, 06:50:43 PM
 #7

IOTA: FUIVHP9YPIQEFJWDISSJGYRORVLBYLZRCROHIDVPJJNSJHFCKVMPJJLASGV9VXRULJIVATQHJUI9JXO SCDURNSYBZC

Remove the space between "FUIVHP9YPIQEFJWDISSJGYRORVLBYLZRCROHIDVPJJNSJHFCKVMPJJLASGV9VXRULJIVATQHJUI9JXO" and "SCDURNSYBZC"
Possum (OP)
Member
**
Offline Offline

Activity: 99
Merit: 11


View Profile WWW
December 11, 2019, 07:15:35 PM
 #8

https://thetangle.org/address/FUIVHP9YPIQEFJWDISSJGYRORVLBYLZRCROHIDVPJJNSJHFCKVMPJJLASGV9VXRULJIVATQHJUI9JXOSC
xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 11, 2019, 07:23:43 PM
 #9

Thank you very much!

URL: http://udopage.com/ssep/index.php

Method="POST"

data="isajax=1&sugest=xxx"

Parameter BUG: sugest

Payload(Bitcointalk does not allow me to place the payload): https://i.ibb.co/hcS58QN/p-iota.png

Type Vulnerability: SQL Injection Boolean



The problem is that it is not filtered correctly in some parameters, and with a type of vulnerability like this, you can extract data from the server databases.
xsync000
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 13, 2019, 07:48:09 PM
 #10

Could you reproduce the bug?
Possum (OP)
Member
**
Offline Offline

Activity: 99
Merit: 11


View Profile WWW
December 20, 2019, 11:28:24 PM
 #11


Sorry for late reply (due to work)

I got  in contact with the distributors of the search and told them about the bug


They made some changes. So hopefully its all fixed..



Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!