Skip to content

Commit a1a1901

Browse files
committed
Improper-markup-sanitization: add bounty info
I initially thought of not dislosing it, but now I think that that information could be valuable by itself.
1 parent 7d23d8c commit a1a1901

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

Improper-markup-sanitization.md

+14
Original file line numberDiff line numberDiff line change
@@ -491,4 +491,18 @@ Updated with Bitbucket XSS disclosure: 2017-06-26 15:40 UTC. \
491491
Updated with Vanilla Forums disclosure: 2018-01-08, 20:50:00 UTC. \
492492
Updated with YouTrack disclosure: 2017-04-25, 9:34 UTC.
493493
494+
---
495+
496+
Of all the mentioned parties, GitHub provided a monetary [bounty](https://bounty.github.com/researchers/ChALkeR.html) for the vulnerability report.
497+
_(Thanks, GitHub)!_
498+
499+
Interestingly, the products that suffered the most serious form of the vulnerability here (i.e. arbitrary JavaScript code in XSS) —
500+
namely [Bitbucket](#bitbucket), [YouTrack](#youtrack), [Upsource](#upsource) — were all closed-source and all did not have any bug
501+
bounty program and did not provide monetary rewards.
502+
503+
_There might be some correlation there and perhaps there is even some lesson, but I don't want to write it down here, so guess yourself._
504+
505+
If you want to support me so that I would be able to keep doing what I am doing, consider supporting me on [Patreon](https://www.patreon.com/ChALkeR).\
506+
Current supporters are listed on my [fundraising](https://github.com/ChALkeR/fundraising#personal-fundraising) page.
507+
494508
If you have any questions to me, contact me over Gitter ([@ChALkeR](https://gitter.im/ChALkeR)) or IRC (ChALkeR@freenode).

0 commit comments

Comments
 (0)