Page 206 - Hands-On Bug Hunting for Penetration Testers
P. 206

Other (Out of Scope) Vulnerabilities                                       Chapter 12

            All of that is to be expected as part of the service and doesn't constitute a leaked source of
            sensitive system information. This includes both information contained in the present
            banners as well as "missing" security banners.



            Known Public Files

            This is simple: some files are designed to be accessible! Reporting on the configuration or
            availability of  SPCPUT UYU, XQ VQMPBET , or TJUFNBQ YNM isn't going to merit a
            payoutbor probably even a response.



            Missing HttpOnly Cookie Flags

            HttpOnly cookie flags are anti-XSS prevention devices. If a server-side process flags a
            cookie as HttpOnly, it can't be accessed client-side (when the browser attempts to read the
            cookie, it just returns an empty string). Every major browser supports HttpOnly cookies.
            But whatever their value, they are a safeguard, and their absence does not directly imply a
            vulnerability. If there's no additional XSS, there's no issue.


            Other Common No-Payout Vulnerabilities


            In addition to the larger categories of bugs that we've discussed that typically don't merit a
            payout, and keeping in mind that these are in addition to previously-submitted
            vulnerabilities, which are ineligible for payout everywhere, there are also a lot of one-offs
            and miscellaneous would-be vulnerabilities you should try to avoid submitting.



            Weak or Easily Nypassed Captchas

            CAPTCHA (and their successor, reCAPTCHAs) are Google-administered Turing tests
            designed to block bot form submission spam by asking a bot to do things (sophisticated
            natural language detection, image pattern recognition, performing tasks on dynamic
            challenges, and so on) that your average bot can't do. Because they represent a third-party
            service whose security posture is managed by an outside company, most companies that
            host CAPTCHAs themselves won't reward any CAPTCHA-related bugs or vulnerabilities.








                                                    [ 191 ]
   201   202   203   204   205   206   207   208   209   210   211