Top reports from Uber program at HackerOne:
- Sensitive user information disclosure at bonjour.uber.com/marketplace/_rpc via the 'userUuid' parameter to Uber - 603 upvotes, $6500
- Chained Bugs to Leak Victim's Uber's FB Oauth Token to Uber - 353 upvotes, $7500
- Reflected XSS and sensitive data exposure, including payment details, on lioncityrentals.com.sg to Uber - 331 upvotes, $4000
- Change any Uber user's password through /rt/users/passwordless-signup - Account Takeover (critical) to Uber - 278 upvotes, $10000
- Stored XSS in developer.uber.com to Uber - 198 upvotes, $7500
- XSS At "pages.et.uber.com" to Uber - 183 upvotes, $0
- Authentication bypass on auth.uber.com via subdomain takeover of saostatic.uber.com to Uber - 152 upvotes, $5000
- Reading Emails in Uber Subdomains to Uber - 130 upvotes, $10000
- Client secret, server tokens for developer applications returned by internal API to Uber - 111 upvotes, $5000
- Open Redirect on central.uber.com allows for account takeover to Uber - 109 upvotes, $8000
- ubernycmarketplace.com is vulnerable to the Heartbleed Bug to Uber - 104 upvotes, $1500
- Stored XSS on any page in most Uber domains to Uber - 99 upvotes, $6000
- password reset token leaking allowed for ATO of an Uber account to Uber - 84 upvotes, $10000
- Possibility to get private email using UUID to Uber - 80 upvotes, $5000
- SAML Authentication Bypass on uchat.uberinternal.com to Uber - 79 upvotes, $8500
- [CRITICAL] -- Complete Account Takeover to Uber - 76 upvotes, $8000
- SQL Injection on sctrack.email.uber.com.cn to Uber - 74 upvotes, $4000
- Subdomain takeover at signup.uber.com to Uber - 74 upvotes, $3000
- Changing paymentProfileUuid when booking a trip allows free rides to Uber - 71 upvotes, $5000
- Lack of proper paymentProfileUUID validation allows any number of free rides without any outstanding balance to Uber - 71 upvotes, $1500
- xss in https://www.uber.com to Uber - 63 upvotes, $7000
- Subdomain takeover on rider.uber.com due to non-existent distribution on Cloudfront to Uber - 63 upvotes, $1000
- uber.com may RCE by Flask Jinja2 Template Injection to Uber - 60 upvotes, $10000
- Authorization issue in Google G Suite allows DoS through HTTP redirect to Uber - 59 upvotes, $2500
- Hack The World 2017 Top 2 Bonus to Uber - 58 upvotes, $5000
- Lack of payment type validation in dial.uber.com allows for free rides to Uber - 58 upvotes, $5000
- OneLogin authentication bypass on WordPress sites via XMLRPC to Uber - 57 upvotes, $7000
- SQL injection in 3rd party software Anomali to Uber - 56 upvotes, $2500
- Blind OOB XXE At "http://ubermovement.com/" to Uber - 52 upvotes, $500
- Multiple vulnerabilities in a WordPress plugin at drive.uber.com to Uber - 50 upvotes, $5000
- Possibility to inject a malicious JavaScript code in any file on tags.tiqcdn.com results in a stored XSS on any page in most Uber domains to Uber - 48 upvotes, $6000
- OneLogin authentication bypass on WordPress sites to Uber - 44 upvotes, $10000
- Avoiding Surge Pricing to Uber - 44 upvotes, $3000
- Reflected XSS on multiple uberinternal.com domains to Uber - 39 upvotes, $2000
- Attacker could setup reminder remotely using brute force to Uber - 36 upvotes, $0
- SQL injection in Wordpress Plugin Huge IT Video Gallery at https://drive.uber.com/frmarketplace/ to Uber - 35 upvotes, $3000
- Reflected XSS in lert.uber.com to Uber - 35 upvotes, $3000
- phone number exposure for riders/drivers given email/uuid to Uber - 35 upvotes, $2000
- Change the rating of any trip, therefore change the average driver rating to Uber - 34 upvotes, $1500
- Stealing users password (Limited Scenario) to Uber - 33 upvotes, $100
- Possibility to brute force invite codes in riders.uber.com to Uber - 32 upvotes, $5000
- Full Path and internal information disclosure+ SQLNet.log file disclose internal network information to Uber - 31 upvotes, $0
- Reflected XSS POST method at partners.uber.com to Uber - 30 upvotes, $3000
- Reflected XSS on Partners Subdomain to Uber - 30 upvotes, $2000
- Stored XSS on developer.uber.com via admin account compromise to Uber - 28 upvotes, $5000
- Information Leakage - GitHub - VCenter configuration scripts, StorMagic usernames and password along with default ESXi root password to Uber - 27 upvotes, $1000
- Improper Access Control on Onelogin in multi-layered architecture to Uber - 26 upvotes, $500
- Site-wide CSRF on eats.uber.com to Uber - 25 upvotes, $6000
- duplicate hsts headers lead to firefox ignoring hsts on business.uber.com to Uber - 24 upvotes, $500
- Reflected XSS on developer.uber.com via Angular template injection to Uber - 23 upvotes, $3000
- Possible to View Driver Waybill via Driver UUID to Uber - 23 upvotes, $3000
- Get organization info base on uuid to Uber - 22 upvotes, $3000
- Possibility to enumerate and bruteforce promotion codes in Uber iOS App to Uber - 22 upvotes, $3000
- pam-ussh may be tricked into using another logged in user's ssh-agent to Uber - 22 upvotes, $1500
- Subdomain takeover on mta1a1.spmail.uber.com to Uber - 22 upvotes, $500
- Subdomain takeover of translate.uber.com, de.uber.com and fr.uber.com to Uber - 21 upvotes, $2250
- Stored XSS on newsroom.uber.com admin panel / Stream WordPress plugin to Uber - 17 upvotes, $5000
- XSS on partners.uber.com due to no user input sanitisation to Uber - 17 upvotes, $1000
- CBC "cut and paste" attack may cause Open Redirect(even XSS) to Uber - 17 upvotes, $500
- Multiple Vulnerabilities (Including SQLi) in love.uber.com to Uber - 17 upvotes, $250
- deleting payment profile during active trip puts account into arrears but active trip is temporarily “free” to Uber - 17 upvotes, $0
- Privacy policy contains hardcoded link using unencrypted HTTP to Uber - 17 upvotes, $0
- Reflected XSS in https://eng.uberinternal.com and https://coeshift.corp.uber.internal/ to Uber - 16 upvotes, $500
- IDOR in activateFuelCard id allows bulk lookup of driver uuids to Uber - 16 upvotes, $500
- Information regarding trips from other users to Uber - 15 upvotes, $5000
- XSS @ love.uber.com to Uber - 14 upvotes, $3000
- Missing authorization checks leading to the exposure of ubernihao.com administrator accounts to Uber - 14 upvotes, $3000
- xss vulnerability in http://ubermovement.com/community/daniel to Uber - 14 upvotes, $750
- IDOR on partners.uber.com allows for a driver to override administrator documents to Uber - 14 upvotes, $500
- Lack of CNAME/A Record Trimming Pointing Uber Domains to Insecure Non-Uber AWS Instances/Sites to Uber - 13 upvotes, $1500
- SMS/Call spamming due to truncated phone number to Uber - 12 upvotes, $500
- Lack of rate limiting on get.uber.com leads to enumeration of promotion codes and estimation of a lower bound on the number of Uber drivers to Uber - 11 upvotes, $3000
- XSS in ubermovement.com via editable Google Sheets to Uber - 11 upvotes, $2000
- Server version disclosure to Uber - 11 upvotes, $0
- Bulk UUID enumeration via invite codes to Uber - 10 upvotes, $1500
- No rate limiting on https://biz.uber.com/confirm allowed an attacker to join arbitrary business.uber.com accounts to Uber - 10 upvotes, $750
- Open redirect on rush.uber.com, business.uber.com, and help.uber.com to Uber - 10 upvotes, $500
- Open Redirect in riders.uber.com to Uber - 9 upvotes, $500
- Full path disclosure on track.uber.com to Uber - 9 upvotes, $100
- Session not expired When logout [partners.uber.com] to Uber - 9 upvotes, $0
- Bypassing Uber Partner's 3 Cancel Limit to Uber - 8 upvotes, $2000
- [IODR] Get business trip via organization id to Uber - 8 upvotes, $2000
- Open Redirection on Uber.com to Uber - 8 upvotes, $500
- Open Redirect in m.uber.com to Uber - 8 upvotes, $500
- Delay of arrears notification allows Riders to take multiple rides without paying to Uber - 8 upvotes, $0
- Reflected XSS on Uber.com careers to Uber - 7 upvotes, $3000
- Can add employee in business.uber.com without add payment method to Uber - 7 upvotes, $0
- Bruteforce INVITE codes easy way to Uber - 7 upvotes, $0
- The Microsoft Store Uber App Does Not Implement Certificate Pinning to Uber - 7 upvotes, $0
- Information Leak - GitHub - Endpoint Configuration Details to Uber - 7 upvotes, $0
- Reflected XSS via Unvalidated / Open Redirect in uber.com to Uber - 6 upvotes, $3000
- newsroom.uber.com is vulnerable to 'SOME' XSS attack via plupload.flash.swf to Uber - 6 upvotes, $1000
- Users can falsely declare their own Uber account info on the monthly billing application to Uber - 6 upvotes, $500
- SMS URL verification link does not expire on phone number change and lacks rate limiting to Uber - 6 upvotes, $500
- Stored Cross Site Scripting [SELF] in partners.uber.com to Uber - 6 upvotes, $0
- It's possible to view configuration and/or source code on uchat.awscorp.uberinternal.com without to Uber - 6 upvotes, $0
- Physical Access to Mobile App Allows Local Attribute Updates without Authentication to Uber - 6 upvotes, $0
- Stored XSS in archive.uber.com Due to Injection of Javascript:alert(0) to Uber - 5 upvotes, $3000
- Reflected XSS via Livefyre Media Wall in newsroom.uber.com to Uber - 5 upvotes, $2000
- ability to retrieve a user's phone-number/email for a given inviteCode to Uber - 5 upvotes, $1000
- Email Address Enumeration to Uber - 5 upvotes, $0
- Requested and received edit access to Google form to Uber - 5 upvotes, $0
- Content injection on 404 error page at faspex.uber.com to Uber - 5 upvotes, $0
- muber-id Query Parameter Can Generate SSL-protected Reflected XSS in https://m.uber.com/0-dfffb25d2cf6ceeb0a27.js Endpoint to Uber - 5 upvotes, $0
- lert.uber.com: Few default folders/files of AURA Framework are accessible to Uber - 5 upvotes, $0
- Stored XSS in drive.uber.com WordPress admin panel to Uber - 4 upvotes, $2000
- Compromising Atlassian Confluence (team.uberinternal.com) via WordPress (newsroom.uber.com) to Uber - 4 upvotes, $0
- Disclosure of ways to the site root to Uber - 4 upvotes, $0
- Uber is Flooding my Mobile with SMS Daily like a cron JOB to Uber - 4 upvotes, $0
- XSS in uber oauth to Uber - 4 upvotes, $0
- reopen #128853 (Information disclosure at lite.uber.com) to Uber - 4 upvotes, $0
- Configuration and/or source code files on uchat-staging.uberinternal.com can be viewed without OneLogin SSO Authentication to Uber - 4 upvotes, $0
- SQLi in love.uber.com to Uber - 3 upvotes, $3000
- Dom Based Xss to Uber - 3 upvotes, $3000
- CSV Injection in business.uber.com to Uber - 3 upvotes, $1000
- Mass Assignment Vulnerability in partners.uber.com to Uber - 3 upvotes, $1000
- Wordpress Vulnerabilities in transparencyreport.uber.com and eng.uber.com domains to Uber - 3 upvotes, $1000
- Brute-Forcing invite codes in partners.uber.com to Uber - 3 upvotes, $750
- CSRF on eng.uber.com may lead to server-side compromise to Uber - 3 upvotes, $0
- Self-XSS Vulnerability on Password Reset Form to Uber - 3 upvotes, $0
- Unsubscribe any user from receiving email to Uber - 3 upvotes, $0
- Use Partner/Driver App Without Being Activated to Uber - 3 upvotes, $0
- Phone Number Enumeration to Uber - 3 upvotes, $0
- Information Disclosure on lite.uber.com to Uber - 3 upvotes, $0
- Header Injection to Uber - 3 upvotes, $0
- Text Only Content Spoofing on ubermovement.com Community Page to Uber - 3 upvotes, $0
- XSS via password recovering to Uber - 3 upvotes, $0
- XSS in people.uber.com to Uber - 3 upvotes, $0
- text injection in get.uber.com/check-otp to Uber - 3 upvotes, $0
- The Microsoft Store Uber App Does Not Implement Server-side Token Revocation to Uber - 3 upvotes, $0
- The Uber Promo Customer Endpoint Does Not Implement Multifactor Authentication, Blacklisting or Rate Limiting to Uber - 3 upvotes, $0
- SSL-protected Reflected XSS in https://m.uber.com/0-dfffb25d2cf6ceeb0a27.js Endpoint to Uber - 3 upvotes, $0
- SSL-protected Reflected XSS in m.uber.com to Uber - 3 upvotes, $0
- SSL-protected Reflected XSS in https://m.uber.com/0-dfffb25d2cf6ceeb0a27.js Endpoint to Uber - 3 upvotes, $0
- udi-id Query Parameter Can Generate SSL-protected Reflected XSS in https://m.uber.com/0-dfffb25d2cf6ceeb0a27.js Endpoint to Uber - 3 upvotes, $0
- lite:sess Query Parameter Can Generate SSL-protected Reflected XSS in https://m.uber.com/0-dfffb25d2cf6ceeb0a27.js Endpoint to Uber - 3 upvotes, $0
- XSS in getrush.uber.com to Uber - 2 upvotes, $3000
- Drivers can change profile picture to Uber - 2 upvotes, $500
- Estimation of a Lower Bound on Number of Uber Drivers via Enumeration to Uber - 2 upvotes, $500
- LIsting of http://archive.uber.com/pypi/simple/ to Uber - 2 upvotes, $0
- It is possible to re-rate a driver after a very long time to Uber - 2 upvotes, $0
- Pixel flood attack in https://riders.uber.com/profile to Uber - 2 upvotes, $0
- CRLF Injection in developer.uber.com to Uber - 2 upvotes, $0
- Enumerating userIDs with phone numbers to Uber - 2 upvotes, $0
- Active Email Hyperlink Sent on riders.uber.com to Uber - 2 upvotes, $0
- Disclosure of ip addresses in local network of uber to Uber - 2 upvotes, $0
- faspex.uber.com uses an invalid SSL certificate to Uber - 2 upvotes, $0
- Server version disclosure: team.uberinternal.com to Uber - 2 upvotes, $0
- Email Enumeration Vulnerability to Uber - 2 upvotes, $0
- Newsroom.uber HTML form without CSRF protection to Uber - 2 upvotes, $0
- Defect-Security | Driver-Broken Authentication | Able to update the Subscription Setting anonymously to Uber - 2 upvotes, $0
- Uber for Business Allows Administrators to Change Uber Driver Ratings Due to Failure to Authenticate
fast-rating
Endpoint to Uber - 2 upvotes, $0 - Missing authentication on Notification setting . to Uber - 2 upvotes, $0
- XSS In archive.uber.com Due to Mime Sniffing in IE to Uber - 1 upvotes, $750
- XSS on partners.uber.com to Uber - 1 upvotes, $500
- Easy spam with USE My PHONE Feature to Uber - 1 upvotes, $250
- Issue with Password reset functionality to Uber - 1 upvotes, $100
- Cross-site Scripting (XSS) autocomplete generation in https://www.uber.com/ to Uber - 1 upvotes, $0
- HTML Escaping Error in the 404 Page on developer.uber.com/docs/ to Uber - 1 upvotes, $0
- Cross-site Scripting (XSS) to Uber - 1 upvotes, $0
- XSS on love.uber.com to Uber - 1 upvotes, $0
- Session retention is present which reveals the customer info to Uber - 1 upvotes, $0
- CrashPlan Backup is Vulnerable Allowing to a DoS Attack Against Uber's Backups to
backup.uber.com
to Uber - 1 upvotes, $0 - DOM based XSS on to Uber - 1 upvotes, $0
- Password Reset Does Not Confirm the Existence of an Email Address to Uber - 1 upvotes, $0
- Create account in uber without signup form to Uber - 1 upvotes, $0
- Privilege escalation to allow non activated users to login and use uber partner ios app to Uber - 1 upvotes, $0
- Uber password reset link EMAIL FLOOD to Uber - 1 upvotes, $0
- Uploading Plain Text to uber-documents.s3.amazonaws.com Through the Driver Document Upload Page to Uber - 1 upvotes, $0
- Changing Driver Passwords With Only an Authenticated Session (no password, no email) to Uber - 1 upvotes, $0
- SMS Flood with Update Profile to Uber - 1 upvotes, $0
- Brute Forcing rider-view Endpoint Allows for Counting Number of Active Uber Drivers to Uber - 1 upvotes, $0
- Session Impersonation in riders.uber.com to Uber - 1 upvotes, $0
- Information disclosure at lite.uber.com to Uber - 1 upvotes, $0
- developer.uber.com/404 and developer.uber.com/docs/404 are susceptible to iframes to Uber - 1 upvotes, $0
- Unauthorized file (invoice) download to Uber - 1 upvotes, $0
- Authentication Issue for easter egg on bonjour.uber.com to Uber - 1 upvotes, $0
- Command Injection, Information to Uber - 1 upvotes, $0
- Self-XSS in Partners Profile to Uber - 1 upvotes, $0
- Error Message on 404 page to Uber - 1 upvotes, $0
- Clickjacking in love.uber.com to Uber - 1 upvotes, $0
- Stored self-XSS at m.uber.com to Uber - 1 upvotes, $0
- User credentials are not strong on vault.uber.com to Uber - 1 upvotes, $0
- Self-XSS on partners.uber.com to Uber - 1 upvotes, $0
- Brute Force Amplification Attack to Uber - 1 upvotes, $0
- User Enumeration and Information Disclosure to Uber - 1 upvotes, $0
- Design Issue at riders.uber.com/profile to Uber - 1 upvotes, $0