<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Kent Jarold Abulag on Medium]]></title>
        <description><![CDATA[Stories by Kent Jarold Abulag on Medium]]></description>
        <link>https://medium.com/@Kntjrld?source=rss-403fae6f5283------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*Xp2JeQHwM04apSLsKU85sA.jpeg</url>
            <title>Stories by Kent Jarold Abulag on Medium</title>
            <link>https://medium.com/@Kntjrld?source=rss-403fae6f5283------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 16 May 2026 17:59:31 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@Kntjrld/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[[RXSS] on Login/Registration ref Parameter]]></title>
            <link>https://medium.com/@Kntjrld/rxss-login-registration-ref-parameter-ea5fa7211c68?source=rss-403fae6f5283------2</link>
            <guid isPermaLink="false">https://medium.com/p/ea5fa7211c68</guid>
            <category><![CDATA[hackerone]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bugcrowd]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[Kent Jarold Abulag]]></dc:creator>
            <pubDate>Sun, 19 Jan 2025 05:44:44 GMT</pubDate>
            <atom:updated>2025-01-20T10:17:33.154Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/874/1*dBwqM6vY1s2akC96K8Q6-w.png" /><figcaption>---</figcaption></figure><p>Hi Everyone, sharing this write-up how I discovered reflected XSS on a random bug bounty program using mobile phone.</p><p>Every website has a redirect function where if a user logout or session terminated, it redirects to the login page. If we check the url, it contains parameters with value of the webpage deep link where the user will redirect after logged back in.</p><ol><li>To know the parameter name or used for any redirects, just copy the url where required a user session.</li></ol><pre>https://www.redacted.com/settings<br></pre><p>2. Logout and paste the URL above and it will require you to login first. You will notice that the URL looks like below.</p><pre>https://www.redacted.com/login?url_redirect=https://www.redacted.com/settings<br></pre><p>3. Change url_redirect value using below payload.</p><pre>javascript:alert(1)<br></pre><p>4. Final output</p><pre>https://www.redacted.com/login?url_direct=javascript:alert(1)<br></pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/864/1*7mwqsRSOD80nGxIiEYqtbQ.jpeg" /><figcaption>Result</figcaption></figure><p>In my case, this website used ref parameter. After it triggers I immediately report it to the security team and they respond within the same day.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/806/1*a2daoRCFyBl-QH-Z2vnLpA.png" /><figcaption>Security Team Response</figcaption></figure><p>Additional related info</p><ul><li><a href="https://www.github.com/payloadbox/xss-payload-list">GitHub - payloadbox/xss-payload-list: 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List</a></li><li><a href="https://portswigger.net/web-security/cross-site-scripting">What is cross-site scripting (XSS) and how to prevent it? | Web Security Academy</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ea5fa7211c68" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bypassing default visibility for newly-added email in Facebook(Part II - Trusted Contacts)]]></title>
            <link>https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-ii-trusted-contacts-36176eeb103?source=rss-403fae6f5283------2</link>
            <guid isPermaLink="false">https://medium.com/p/36176eeb103</guid>
            <category><![CDATA[whitehat]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[facebook]]></category>
            <dc:creator><![CDATA[Kent Jarold Abulag]]></dc:creator>
            <pubDate>Fri, 25 Feb 2022 02:10:47 GMT</pubDate>
            <atom:updated>2024-11-18T14:18:17.346Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/734/1*tnGnS3DLgADuWM9Uyr_jVA.jpeg" /><figcaption>Meta BBP</figcaption></figure><p>How I managed to bypassed again the default visibility for newly-added email in Facebook. Here is the link of my first write-up related to issue:</p><p><a href="https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-i-submitting-i-d-da78142f032d">Bypassing default visibility for newly-added email in Facebook(Part I - Submitting I.D)</a></p><p>Steps to reproduce:</p><p>1. Go to Facebook Settings &gt; Password and Security &gt; Setting up extra security and choose 3 trusted contacts.<br>2. Go to <a href="http://facebook.com/login/identify">facebook.com/login/identify</a> and find your Facebook account.<br>3. Click &quot;No longer have access to these?&quot; and provide valid email address.<br>4. Get all recovery code from your 3 trusted contacts and follow the instruction provided to create a successful recovery.<br>5. Check the visibility of new added email using own account or other account.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*BHQcYo5SrQEl0psHDqkJuA.jpeg" /></figure><h3>Timeline:</h3><blockquote>21 January 2022 - Initial Report<br>25 January 2022 - Provided some details<br>26 January 2022 - Triage<br>24 February 2022 - Fixed and awarded $xxx</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=36176eeb103" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bypassing default visibility for newly-added email in Facebook(Part I - Submitting I.D)]]></title>
            <link>https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-i-submitting-i-d-da78142f032d?source=rss-403fae6f5283------2</link>
            <guid isPermaLink="false">https://medium.com/p/da78142f032d</guid>
            <category><![CDATA[facebook]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[whitehat]]></category>
            <dc:creator><![CDATA[Kent Jarold Abulag]]></dc:creator>
            <pubDate>Fri, 25 Feb 2022 02:08:55 GMT</pubDate>
            <atom:updated>2024-11-18T14:16:28.930Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/734/1*tnGnS3DLgADuWM9Uyr_jVA.jpeg" /><figcaption>Meta BBP</figcaption></figure><p>This bug is first announced at Facebook Bug Bounty page where they called it Visibility Setting Bug and thanks to <a href="https://medium.com/u/12bf4d00ab55">Saugat Pokharel</a> for sharing his findings. First, the default visibility for newly-added contact in Facebook is always set to &quot;Only Me&quot;. However through Facebook account recovery, I noticed that the email address that added to account is in unexpected privacy.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Gb8anun8e0esEaleygeNhg.jpeg" /><figcaption>Facebook Email after confirming user identity</figcaption></figure><h3>Steps to reproduce</h3><p>1. Go to facebook.com/login/identify and find your Facebook account.<br>2. Click &quot;No longer have access to these?&quot; and choose &quot;I cannot access my Email&quot;.<br>3. Enter a new email address and upload supported documents.<br>4. When you receive the email of Facebook about confirming your identity, login your account and check the visibility setting of the new added email address to your account.</p><p>In this case, Facebook Security added the new email address with visibility that set to &quot;Friends&quot;.</p><p>This report got two requested review because they don’t consider it as valid. I tried to clarify my report until I received this reply.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vyBlA5Q7MOoic7zdQck6Hg.jpeg" /><figcaption>Closed as Informative</figcaption></figure><p>So I understand why they don’t consider it as valid, But after 5 days I received this reply.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*TLfeYjuFPPFRXicCGaSHzQ.jpeg" /><figcaption>Tagged as valid report</figcaption></figure><p>This is the link of my part II write-up related to this issue:</p><p><a href="https://medium.com/@Kntjrld/bypassing-default-visibility-for-newly-added-email-in-facebook-part-ii-trusted-contacts-36176eeb103">Bypassing default visibility for newly-added email in Facebook(Part II - Trusted Contacts)</a></p><p>To understand more this issue here’s the first security researcher write-up regarding to this issue:</p><p><a href="https://iamsaugat.medium.com/a-facebook-bug-that-exposes-email-phone-number-to-your-friends-a980d24e5ea8">A Facebook bug that exposes email/phone number to your friends</a></p><h3>Timeline:</h3><blockquote>06 -SEP-2021 - Initial Report<br>08-SEP-2021 - Closed my report<br>08-SEP-2021 - Requested a review<br>10-SEP- 2021 - Closed my report<br>10-SEP- 2021 - Requested a review again<br>14-SEP-2021 - Closed my report again<br>19-SEP-2021 - Considered my report as eligible<br>05-OCT-2021 - Rewarded $x,xxx but fix is still pending<br>13-OCT-2021 - Fixed</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=da78142f032d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Facebook Page admin disclosure]]></title>
            <link>https://medium.com/@Kntjrld/not-valid-bug-that-leads-to-us-a-multiple-valid-report-in-facebook-25a3fb8cb51?source=rss-403fae6f5283------2</link>
            <guid isPermaLink="false">https://medium.com/p/25a3fb8cb51</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[facebook]]></category>
            <dc:creator><![CDATA[Kent Jarold Abulag]]></dc:creator>
            <pubDate>Sat, 24 Jul 2021 10:47:09 GMT</pubDate>
            <atom:updated>2024-11-18T14:20:09.306Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/734/1*tnGnS3DLgADuWM9Uyr_jVA.jpeg" /><figcaption>Meta BBP</figcaption></figure><p>I’m here again to share my 2nd and 3rd valid report. It’s all about page admin disclosure in Facebook Lite. In my Initial report, Facebook security team says its not valid because my Initial report is admin disclosure through reaction. When I create a post and click &quot;View Post&quot; then tried to react in my own post or in any random comment in my new post, my personal account reflected to who’s reacted instead of my page. Facebook security team clarify that anyone can react in any public post/comment so its hard to identify that its from the admin of the page.</p><p>After a few days I found a bug that related to my last report. With all the same procedure, the comment section can disclose admins personal account. Without any sign that you&#39;re interacting to your page as your profile, your personal account interact to the page. So I open my last report to discuss my concern and they easily identify what It is.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dYWT8esZC2V8vYKrA1FG6g.jpeg" /></figure><h3>Steps to reproduce:</h3><p>1. Create a post on a page using Facebook Lite<br>2. Instead of clicking &quot;Close&quot; click &quot;View Post&quot; and comment on anything.</p><p>When an admin clicks &quot;View Post&quot; they’re interacting to the page as followers so when they want to comment on something, their personal identity interacts with the page.</p><p><strong>Timeline:</strong></p><blockquote>06 June 2021 : Initial report <br>09 June 2021 : Facebook security team says its not valid<br>12 June 2021 : Review Requested <br>16 June 2021 : Manage to reproduced and Triaged<br>24 June 2021 : Fixed<br>25 June 2021 : Rewarded $xxx</blockquote><p>While waiting to fixed that report, I found again one interesting bug that could lead to admin disclosure. When a page admin taps any comment notification from the page using Facebook Lite, comments they make at that time would be posted with their personal identity. I wait to fix my current report before submitting a new report because they&#39;re currently working at this product. And after one week of waiting my report is fixed and I&#39;m lucky that this bug is still exist. So I submit this as new report and it&#39;s triage in less than 24 hours. After 5 days they said that it&#39;s already fixed but I noticed that when a notification is direct to reply someone&#39;s comment, still personal profile of the admin interact to the page.</p><h3>Steps to reproduce:</h3><p>UserA = Page Admin<br>UserB = follower of the page<br>1. UserA create a post in page<br>2. UserB comment on that post<br>3. In Facebook Lite, UserA taps that comment notification from page.<br>4. UserA reply to UserB.</p><p><strong>Timeline</strong>:</p><blockquote>25 June 2021 : submit new report<br>25 June 2021 : Triaged<br>30 June 2021 : Fixed and Triaged (There’s some needed to fix)<br>20 July 2021 : Fixed<br>23 July 2021 : Rewarded $xxx</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=25a3fb8cb51" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[My first Bug report at Facebook 2021]]></title>
            <link>https://medium.com/@Kntjrld/my-first-bug-report-at-facebook-2021-bab2c2373ee3?source=rss-403fae6f5283------2</link>
            <guid isPermaLink="false">https://medium.com/p/bab2c2373ee3</guid>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty-2021]]></category>
            <category><![CDATA[facebook-white-hat]]></category>
            <dc:creator><![CDATA[Kent Jarold Abulag]]></dc:creator>
            <pubDate>Wed, 31 Mar 2021 10:25:20 GMT</pubDate>
            <atom:updated>2024-11-18T14:21:31.489Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/734/1*tnGnS3DLgADuWM9Uyr_jVA.jpeg" /><figcaption>Meta BBP</figcaption></figure><p>Sharing my story how I was rewarded $xxx from Facebook. I started hunting a bug this February 2021 when I see it to one member of group that he will be awarded by doing that things. But in actual hunting, I realized that It’s not easy like I think. I submit a reports in Bugcrowd and HackerOne but my reports is Informative and the one is duplicate. It’s not easy for beginners so I always reading write-ups and watching in Youtube. Until I read a write-ups of bug in Facebook and that’s it. For those who didn’t already know, Facebook can award you if you found a bug that may affects to Privacy of it’s user and award can be high if you will find a High risk bug.</p><p>Since I always deactivate my Facebook account and I always used only is the Messenger app, It brings me to my first bug bounty in Facebook. Through Facebook Messenger a deactivated Facebook account can able to send message to any Facebook user and Instagram user. In searching bugs in both application I found that if the Facebook is deactivated, Instagram user can&#39;t block it.</p><h3>Title: Instagram User was Unable to Block deactivated Facebook account on cross-app communication</h3><h4>Steps to reproduce:</h4><p>1. Deactivate your Facebook account and use Messenger application<br>2. Through Messenger send a message to any Instagram user except to Instagram account that connected to your Facebook account.<br>3. From Instagram app, you can send and receive a message from Deactivated Facebook account but you can’t block that Facebook account.</p><p>PoC link: <a href="https://youtu.be/et7yC6ENqRs">https://youtu.be/et7yC6ENqRs</a></p><p>I have some tips for beginners or new to Facebook bug bounty program. This is based on my experienced.</p><p>1. Always update your application before you starts hunting.<br>2. If you know that you find a bug. Test it multiple times before doing a write-ups.<br>3. Always provide PoC even your bug is easy to reproduce. <br>4. Be nice to security team.</p><p>And last don&#39;t give up, I failed multiple times before I get my first bug bounty but I considered myself as lucky because 2 months in hunting bug and almost 1 month in Facebook bug bounty program is too soon for me to be awarded.</p><h4>Edited:</h4><p>Special thanks to Admin Rien/Rena of PHU IV and Pinoy Info Sec.</p><p>Timeline:</p><blockquote>March 6, 2021 - Initial report<br>March 10, 2021 - Needs a PoC<br>March 11, 2021 - I sent PoC<br>March 17, 2021 - I conduct a test to different account and I sent again the 2nd PoC.<br>March 18, 2021 - Triaged<br>March 25, 2021 - Fixed<br>March 31, 2021 - Bounty awarded</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bab2c2373ee3" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>