Top reports from Eternal program at HackerOne:
- Stealing Zomato X-Access-Token: in Bulk using HTTP Request Smuggling on api.zomato.com to Eternal - 557 upvotes, $0
- [www.zomato.com] SQLi - /php/██████████ - item_id to Eternal - 320 upvotes, $4500
- Improper Validation at Partners Login to Eternal - 248 upvotes, $2000
- [www.zomato.com] CORS Misconfiguration, could lead to disclosure of sensitive information to Eternal - 240 upvotes, $550
- [www.zomato.com] Availing Zomato Gold membership for free by tampering plan id(s) to Eternal - 228 upvotes, $0
- SQL Injection in www.hyperpure.com to Eternal - 227 upvotes, $2000
- [www.zomato.com] Blind XSS on one of the Admin Dashboard to Eternal - 218 upvotes, $750
- Information Disclosure through Sentry Instance ███████ to Eternal - 176 upvotes, $750
- Solr Injection in
user_idparameter at :/v2/leaderboard_v2.json to Eternal - 137 upvotes, $2000 - [api.zomato.com] Able to manipulate order amount to Eternal - 134 upvotes, $0
- Able to manipulate order amount by removing cancellation amount and cause financial impact to Eternal - 129 upvotes, $0
- Add upto 10K rupees to a wallet by paying an arbitrary amount to Eternal - 128 upvotes, $2000
- Availing Zomato gold by using a random third-party
wallet_idto Eternal - 115 upvotes, $2000 - [Zomato Order] Insecure deeplink leads to sensitive information disclosure to Eternal - 112 upvotes, $750
- [www.zomato.com] Leaking Email Addresses of merchants via reset password feature to Eternal - 111 upvotes, $0
- Claiming the listing of a non-delivery restaurant through OTP manipulation to Eternal - 105 upvotes, $3250
- Login to any account with the emailaddress to Eternal - 102 upvotes, $1000
- [www.zomato.com] Blind XSS in one of the admin dashboard to Eternal - 101 upvotes, $500
- Base alpha version code exposure to Eternal - 98 upvotes, $0
- Subdomain takeover of fr1.vpn.zomans.com to Eternal - 96 upvotes, $350
- credentials leakage in public lead to view dev websites to Eternal - 77 upvotes, $0
- [www.zomato.com] Tampering with Order Quantity and paying less amount then actual amount, leads to business loss to Eternal - 76 upvotes, $0
- [https://reviews.zomato.com] Time Based SQL Injection to Eternal - 71 upvotes, $1000
- Page has a link to google drive which has logos and a few customer phone recordings to Eternal - 71 upvotes, $200
- [www.zomato.com] Blind SQL Injection in /php/geto2banner to Eternal - 68 upvotes, $2000
- [Zomato Android/iOS] Theft of user session to Eternal - 68 upvotes, $0
- IDOR to delete images from other stores to Eternal - 63 upvotes, $600
- [www.zomato.com] SQLi on
order_idparameter to Eternal - 62 upvotes, $1000 - [www.zomato.com] Blind XSS in one of the Admin Dashboard to Eternal - 61 upvotes, $0
- subdomain takeover on fddkim.zomato.com to Eternal - 61 upvotes, $0
- [www.zomato.com] Union SQLi + Waf Bypass to Eternal - 60 upvotes, $1000
- Open AWS S3 bucket leaks all Images uploaded to Zomato chat to Eternal - 57 upvotes, $0
- [www.zomato.com] Blind SQL Injection in /php/widgets_handler.php to Eternal - 53 upvotes, $2000
- [Zomato for Business Android] Vulnerability in exported activity WebView to Eternal - 52 upvotes, $0
- [auth2.zomato.com] Reflected XSS at
oauth2/fallbacks/error| ORY Hydra an OAuth 2.0 and OpenID Connect Provider to Eternal - 50 upvotes, $0 - Race condition in User comments Likes to Eternal - 44 upvotes, $0
- [www.zomato.com] Boolean SQLi - /█████.php to Eternal - 41 upvotes, $1000
- Blind XSS - Report review - Admin panel to Eternal - 41 upvotes, $350
- IDOR to cancel any table booking and leak sensitive information such as email,mobile number,uuid to Eternal - 37 upvotes, $250
- Attacker shall recieve order updates on whatsapp for users who have activated whatsapp notification to Eternal - 36 upvotes, $300
- [www.zomato.com] Boolean SQLi - /███████.php to Eternal - 35 upvotes, $1000
- [www.zomato.com/dubai/gold] CRITICAL - Allowing arbitrary amount to become a GOLD Member to Eternal - 34 upvotes, $0
- Unauthorised Access to Anyone's User Account to Eternal - 32 upvotes, $0
- [www.zomato.com] IDOR - Leaking all Personal Details of all Zomato Users through an endpoint to Eternal - 32 upvotes, $0
- SSRF in https://www.zomato.com████ allows reading local files and website source code to Eternal - 32 upvotes, $0
- Self-Stored XSS - Chained with login/logout CSRF to Eternal - 31 upvotes, $300
- Admin Access to a domain used for development and admin access to internal dashboards on that domain to Eternal - 31 upvotes, $0
- CORS Misconfiguration on www.zomato.com to Eternal - 30 upvotes, $0
- Possible to enumerate Addresses of users using AddressId and guessing the delivery_subzone to Eternal - 28 upvotes, $1500
- [█████████] Hardcoded credentials in Android App to Eternal - 28 upvotes, $500
- [www.zomato.com] Privilege Escalation - /php/restaurant_menus_handler.php to Eternal - 26 upvotes, $200
- HTML injection leads to reflected XSS to Eternal - 26 upvotes, $150
- Use any User to Follow you (Increase Followers) [IDOR] to Eternal - 24 upvotes, $50
- Reflected XSS on developers.zomato.com to Eternal - 23 upvotes, $100
- [www.zomato.com] Abusing LocalParams to Inject Code through ███████ query to Eternal - 23 upvotes, $0
- Improper validation allows user to unlock Zomato Gold multiple times at the same restaurant within one day to Eternal - 22 upvotes, $0
- Length extension attack leading to HTML injection to Eternal - 21 upvotes, $100
- [www.zomato.com] Unauthenticated access to Internal Sales Data of Zomato through an unrestricted endpoint to Eternal - 21 upvotes, $0
- Ability to manipulate price with a max threshold of
\<1 Rupeein support rider parameter to Eternal - 21 upvotes, $0 - [www.zomato.com] IDOR - Gold Subscription Details, Able to view "Membership ID" and "Validity Details" of other Users to Eternal - 20 upvotes, $100
- SQL Injection, exploitable in boolean mode to Eternal - 20 upvotes, $0
- [www.zomato.com] IDOR - Delete/Deactivate any special menu of any Restaurants from Zomato to Eternal - 20 upvotes, $0
- Instagram OAuth2 Implementation Leaks Access Token; Allows for Cross-Site Script Inclusion (XSSI) to Eternal - 19 upvotes, $0
- [www.zomato.com] Privilege Escalation - Control reviews - /████dashboard_handler.php to Eternal - 18 upvotes, $300
- Amazon S3 bucket misconfiguration (share) to Eternal - 18 upvotes, $0
- Free food bug done by burp suite to Eternal - 17 upvotes, $0
- [www.zomato.com] IDOR - Delete/Deactivate ANY/ALL Promos through a Post Request at clients/promoDataHandler.php to Eternal - 16 upvotes, $0
- Phishing user to download malicious app could lead to leakage of User Access Token, Email, Name and Profile photo via exported RemoteService to Eternal - 15 upvotes, $300
- HTML Injection @ /[restaurant]/order endpoint. to Eternal - 15 upvotes, $150
- Posting to Twitter CSRF on php/post_twitter_authenticate.php to Eternal - 15 upvotes, $50
- test.zba.se is vulnerable to SSL POODLE to Eternal - 15 upvotes, $0
- takeover a lot of accounts to Eternal - 15 upvotes, $0
- Restaurant payment information leakage to Eternal - 15 upvotes, $0
- User Profiles Leak PII in HTML Document for Mobile Browser User Agents to Eternal - 15 upvotes, $0
- Bypass OTP verification when placing Order to Eternal - 14 upvotes, $0
- Reflected XSS on https://www.zomato.com to Eternal - 14 upvotes, $0
- Zomato.com Reflected Cross Site Scripting to Eternal - 13 upvotes, $100
- Bypass OTP verification when placing Order to Eternal - 13 upvotes, $0
- Unauthorized update of merchants' information via /php/merchant_details.php to Eternal - 13 upvotes, $0
- Potential server misconfiguration leads to disclosure of vendor/ directory to Eternal - 12 upvotes, $0
- [Zomato's Blog] POST based XSS on https://www.zomato.com/blog/wp-admin/admin-ajax.php?td_theme_name=Newspaper&v=8.2 to Eternal - 11 upvotes, $100
- [www.zomato.com] Abusing LocalParams (city) to Inject SOLR query to Eternal - 11 upvotes, $100
- Open Redirect On Your Login Panel to Eternal - 11 upvotes, $0
- Sending Unlimited Emails to anyone from zomato mail server. to Eternal - 11 upvotes, $0
- The vulnerabilities found were XSS, Public disclosure, Network enumeration via CSRF, DLL hijacking. to Eternal - 11 upvotes, $0
- Visibility Robots.txt file to Eternal - 10 upvotes, $0
- Reflected XSS on business-blog.zomato.com - Part I to Eternal - 10 upvotes, $0
- IDOR in treat subscriptions to Eternal - 10 upvotes, $0
- Mathematical error found in meals for one to Eternal - 10 upvotes, $0
- Stored Cross site scripting to Eternal - 9 upvotes, $0
- XSS onmouseover to Eternal - 9 upvotes, $0
- Twitter Disconnect CSRF to Eternal - 9 upvotes, $0
- Zomato Map server going out of memory while resizing map image to Eternal - 9 upvotes, $0
- [api.zomato.com] Abusing LocalParams (city_id) to Inject SOLR query to Eternal - 8 upvotes, $150
- CSRF in the "Add restaurant picture" function to Eternal - 8 upvotes, $50
- Reflected XSS in Zomato Mobile - category parameter to Eternal - 7 upvotes, $0
- Bypassing the SMS sending limit for download app link. to Eternal - 7 upvotes, $0
- Outdated MediaElement.js Reflected Cross-Site Scripting (XSS) to Eternal - 6 upvotes, $0
- [www.zomato.com] Getting a complimentary dessert [Zomato Treats] on ordering a Meal at no cost to Eternal - 6 upvotes, $0
- CSRF AT SELECTING ZAMATO HANDLE to Eternal - 5 upvotes, $0
- Several XSS affecting Zomato.com and developers.zomato.com to Eternal - 5 upvotes, $0
- CSRF AT INVITING PEOPLE THOUGH PHONE NUMBER to Eternal - 5 upvotes, $0
- Reflected XSS on business-blog.zomato.com - Part 2 to Eternal - 5 upvotes, $0
- CSRF To Like/Unlike Photos to Eternal - 5 upvotes, $0
- Subdomain Takeover to Eternal - 4 upvotes, $0
- Weak Password Policy to Eternal - 4 upvotes, $0
- Persistent input validation mail encoding vulnerability in the "just followed you" email notification. to Eternal - 4 upvotes, $0
- Authentication Bypassing and Sensitive Information Disclosure on Verify Email Address in Registration Flow to Eternal - 4 upvotes, $0
- Reflected Cross-Site Scripting in www.zomato.com/php/instagram_tag_relay to Eternal - 4 upvotes, $0
- Clickjacking login page of http://book.zomato.com/ to Eternal - 4 upvotes, $0
- MailPoet Newsletters <= 2.7.2 - Authenticated Reflected Cross-Site Scripting (XSS) to Eternal - 4 upvotes, $0
- XSS in flashmediaelement.swf (business-blog.zomato.com) to Eternal - 4 upvotes, $0
- xss found in zomato to Eternal - 4 upvotes, $0
- XSS on zomato.com to Eternal - 3 upvotes, $0
- NexTable: Credentials exposure to Eternal - 3 upvotes, $0
- Clickjacking: Delete Account, Change privacy settings, Rate business, follow/unfollow (IE) to Eternal - 3 upvotes, $0
- Cross Site Scripting - type Patameter to Eternal - 2 upvotes, $0
- Reflected XSS on Zomato API to Eternal - 2 upvotes, $0
- CSS to Eternal - 2 upvotes, $0
- URL is vulnerable to clickjacking to Eternal - 2 upvotes, $0
- XSS in "explore-keywords-dropdown" results. to Eternal - 2 upvotes, $0
- Lack of Password Confirmation for Account Deletion to Eternal - 2 upvotes, $0
- Remote File Upload Vulnerability in business-blog.zomato.com to Eternal - 1 upvotes, $0
- XSS and CSRF in Zomato Contact form to Eternal - 1 upvotes, $0
- Persistent XSS on Reservation / Booking Page to Eternal - 1 upvotes, $0
- Two XSS vulns in widget parameters (all_collections.php and o2.php) to Eternal - 1 upvotes, $0
- Unvalidated redirect on user profile website to Eternal - 1 upvotes, $0
- XSS via modified Zomato widget (res_search_widget.php) to Eternal - 0 upvotes, $0