Top reports from Zomato program at HackerOne:
- Stealing Zomato X-Access-Token: in Bulk using HTTP Request Smuggling on api.zomato.com to Zomato - 536 upvotes, $5000
- [www.zomato.com] SQLi - /php/██████████ - item_id to Zomato - 282 upvotes, $4500
- Improper Validation at Partners Login to Zomato - 225 upvotes, $2000
- [www.zomato.com] Availing Zomato Gold membership for free by tampering plan id(s) to Zomato - 220 upvotes, $1000
- [www.zomato.com] Blind XSS on one of the Admin Dashboard to Zomato - 212 upvotes, $750
- [www.zomato.com] CORS Misconfiguration, could lead to disclosure of sensitive information to Zomato - 212 upvotes, $550
- SQL Injection in www.hyperpure.com to Zomato - 211 upvotes, $2000
- Information Disclosure through Sentry Instance ███████ to Zomato - 169 upvotes, $750
- [api.zomato.com] Able to manipulate order amount to Zomato - 131 upvotes, $4500
- Solr Injection in
user_id
parameter at :/v2/leaderboard_v2.json to Zomato - 130 upvotes, $2000 - Able to manipulate order amount by removing cancellation amount and cause financial impact to Zomato - 121 upvotes, $750
- Add upto 10K rupees to a wallet by paying an arbitrary amount to Zomato - 107 upvotes, $2000
- [Zomato Order] Insecure deeplink leads to sensitive information disclosure to Zomato - 103 upvotes, $750
- [www.zomato.com] Leaking Email Addresses of merchants via reset password feature to Zomato - 100 upvotes, $500
- Availing Zomato gold by using a random third-party
wallet_id
to Zomato - 99 upvotes, $2000 - Base alpha version code exposure to Zomato - 98 upvotes, $500
- [www.zomato.com] Blind XSS in one of the admin dashboard to Zomato - 96 upvotes, $500
- Login to any account with the emailaddress to Zomato - 93 upvotes, $1000
- Subdomain takeover of fr1.vpn.zomans.com to Zomato - 89 upvotes, $350
- Claiming the listing of a non-delivery restaurant through OTP manipulation to Zomato - 85 upvotes, $3250
- credentials leakage in public lead to view dev websites to Zomato - 75 upvotes, $400
- [www.zomato.com] Tampering with Order Quantity and paying less amount then actual amount, leads to business loss to Zomato - 67 upvotes, $1500
- [https://reviews.zomato.com] Time Based SQL Injection to Zomato - 66 upvotes, $1000
- [www.zomato.com] SQLi on
order_id
parameter to Zomato - 60 upvotes, $1000 - [Zomato Android/iOS] Theft of user session to Zomato - 60 upvotes, $650
- [www.zomato.com] Blind XSS in one of the Admin Dashboard to Zomato - 60 upvotes, $500
- [www.zomato.com] Blind SQL Injection in /php/geto2banner to Zomato - 58 upvotes, $2000
- [www.zomato.com] Union SQLi + Waf Bypass to Zomato - 56 upvotes, $1000
- subdomain takeover on fddkim.zomato.com to Zomato - 56 upvotes, $350
- IDOR to delete images from other stores to Zomato - 50 upvotes, $600
- Open AWS S3 bucket leaks all Images uploaded to Zomato chat to Zomato - 49 upvotes, $300
- [Zomato for Business Android] Vulnerability in exported activity WebView to Zomato - 48 upvotes, $0
- [www.zomato.com] Blind SQL Injection in /php/widgets_handler.php to Zomato - 45 upvotes, $2000
- [auth2.zomato.com] Reflected XSS at
oauth2/fallbacks/error
| ORY Hydra an OAuth 2.0 and OpenID Connect Provider to Zomato - 45 upvotes, $250 - [www.zomato.com] Boolean SQLi - /█████.php to Zomato - 38 upvotes, $1000
- Blind XSS - Report review - Admin panel to Zomato - 38 upvotes, $350
- Race condition in User comments Likes to Zomato - 37 upvotes, $150
- [www.zomato.com] Boolean SQLi - /███████.php to Zomato - 34 upvotes, $1000
- [www.zomato.com/dubai/gold] CRITICAL - Allowing arbitrary amount to become a GOLD Member to Zomato - 33 upvotes, $500
- Page has a link to google drive which has logos and a few customer phone recordings to Zomato - 32 upvotes, $200
- SSRF in https://www.zomato.com████ allows reading local files and website source code to Zomato - 31 upvotes, $1000
- Admin Access to a domain used for development and admin access to internal dashboards on that domain to Zomato - 29 upvotes, $1000
- [www.zomato.com] IDOR - Leaking all Personal Details of all Zomato Users through an endpoint to Zomato - 29 upvotes, $750
- Self-Stored XSS - Chained with login/logout CSRF to Zomato - 29 upvotes, $300
- IDOR to cancel any table booking and leak sensitive information such as email,mobile number,uuid to Zomato - 29 upvotes, $250
- Unauthorised Access to Anyone's User Account to Zomato - 29 upvotes, $0
- [█████████] Hardcoded credentials in Android App to Zomato - 26 upvotes, $500
- CORS Misconfiguration on www.zomato.com to Zomato - 26 upvotes, $0
- Attacker shall recieve order updates on whatsapp for users who have activated whatsapp notification to Zomato - 25 upvotes, $300
- [www.zomato.com] Privilege Escalation - /php/restaurant_menus_handler.php to Zomato - 25 upvotes, $200
- HTML injection leads to reflected XSS to Zomato - 24 upvotes, $150
- [www.zomato.com] Abusing LocalParams to Inject Code through ███████ query to Zomato - 23 upvotes, $700
- Reflected XSS on developers.zomato.com to Zomato - 23 upvotes, $100
- Possible to enumerate Addresses of users using AddressId and guessing the delivery_subzone to Zomato - 22 upvotes, $1500
- Length extension attack leading to HTML injection to Zomato - 21 upvotes, $100
- Use any User to Follow you (Increase Followers) [IDOR] to Zomato - 21 upvotes, $50
- SQL Injection, exploitable in boolean mode to Zomato - 20 upvotes, $300
- [www.zomato.com] Unauthenticated access to Internal Sales Data of Zomato through an unrestricted endpoint to Zomato - 20 upvotes, $250
- Improper validation allows user to unlock Zomato Gold multiple times at the same restaurant within one day to Zomato - 20 upvotes, $150
- [www.zomato.com] Privilege Escalation - Control reviews - /████dashboard_handler.php to Zomato - 18 upvotes, $300
- Ability to manipulate price with a max threshold of
\<1 Rupee
in support rider parameter to Zomato - 18 upvotes, $150 - Free food bug done by burp suite to Zomato - 17 upvotes, $0
- [www.zomato.com] IDOR - Delete/Deactivate any special menu of any Restaurants from Zomato to Zomato - 16 upvotes, $100
- Amazon S3 bucket misconfiguration (share) to Zomato - 16 upvotes, $0
- User Profiles Leak PII in HTML Document for Mobile Browser User Agents to Zomato - 15 upvotes, $500
- Phishing user to download malicious app could lead to leakage of User Access Token, Email, Name and Profile photo via exported RemoteService to Zomato - 15 upvotes, $300
- HTML Injection @ /[restaurant]/order endpoint. to Zomato - 15 upvotes, $150
- takeover a lot of accounts to Zomato - 15 upvotes, $0
- Restaurant payment information leakage to Zomato - 14 upvotes, $500
- Reflected XSS on https://www.zomato.com to Zomato - 14 upvotes, $100
- [www.zomato.com] IDOR - Gold Subscription Details, Able to view "Membership ID" and "Validity Details" of other Users to Zomato - 14 upvotes, $100
- Posting to Twitter CSRF on php/post_twitter_authenticate.php to Zomato - 14 upvotes, $50
- test.zba.se is vulnerable to SSL POODLE to Zomato - 14 upvotes, $0
- [www.zomato.com] IDOR - Delete/Deactivate ANY/ALL Promos through a Post Request at clients/promoDataHandler.php to Zomato - 13 upvotes, $200
- Zomato.com Reflected Cross Site Scripting to Zomato - 13 upvotes, $100
- Instagram OAuth2 Implementation Leaks Access Token; Allows for Cross-Site Script Inclusion (XSSI) to Zomato - 13 upvotes, $0
- Bypass OTP verification when placing Order to Zomato - 11 upvotes, $250
- Unauthorized update of merchants' information via /php/merchant_details.php to Zomato - 11 upvotes, $200
- Bypass OTP verification when placing Order to Zomato - 11 upvotes, $0
- Sending Unlimited Emails to anyone from zomato mail server. to Zomato - 11 upvotes, $0
- Visibility Robots.txt file to Zomato - 10 upvotes, $0
- Potential server misconfiguration leads to disclosure of vendor/ directory to Zomato - 10 upvotes, $0
- Open Redirect On Your Login Panel to Zomato - 10 upvotes, $0
- The vulnerabilities found were XSS, Public disclosure, Network enumeration via CSRF, DLL hijacking. to Zomato - 10 upvotes, $0
- [Zomato's Blog] POST based XSS on https://www.zomato.com/blog/wp-admin/admin-ajax.php?td_theme_name=Newspaper&v=8.2 to Zomato - 9 upvotes, $100
- [www.zomato.com] Abusing LocalParams (city) to Inject SOLR query to Zomato - 9 upvotes, $100
- XSS onmouseover to Zomato - 9 upvotes, $0
- Twitter Disconnect CSRF to Zomato - 9 upvotes, $0
- Reflected XSS on business-blog.zomato.com - Part I to Zomato - 9 upvotes, $0
- Zomato Map server going out of memory while resizing map image to Zomato - 9 upvotes, $0
- Mathematical error found in meals for one to Zomato - 9 upvotes, $0
- CSRF in the "Add restaurant picture" function to Zomato - 8 upvotes, $50
- Stored Cross site scripting to Zomato - 8 upvotes, $0
- Bypassing the SMS sending limit for download app link. to Zomato - 7 upvotes, $0
- [www.zomato.com] Getting a complimentary dessert [Zomato Treats] on ordering a Meal at no cost to Zomato - 6 upvotes, $250
- [api.zomato.com] Abusing LocalParams (city_id) to Inject SOLR query to Zomato - 6 upvotes, $150
- IDOR in treat subscriptions to Zomato - 6 upvotes, $100
- Reflected XSS in Zomato Mobile - category parameter to Zomato - 6 upvotes, $0
- Several XSS affecting Zomato.com and developers.zomato.com to Zomato - 5 upvotes, $0
- CSRF AT INVITING PEOPLE THOUGH PHONE NUMBER to Zomato - 5 upvotes, $0
- Reflected XSS on business-blog.zomato.com - Part 2 to Zomato - 5 upvotes, $0
- CSRF To Like/Unlike Photos to Zomato - 5 upvotes, $0
- Outdated MediaElement.js Reflected Cross-Site Scripting (XSS) to Zomato - 5 upvotes, $0
- Subdomain Takeover to Zomato - 4 upvotes, $0
- Persistent input validation mail encoding vulnerability in the "just followed you" email notification. to Zomato - 4 upvotes, $0
- Reflected Cross-Site Scripting in www.zomato.com/php/instagram_tag_relay to Zomato - 4 upvotes, $0
- MailPoet Newsletters <= 2.7.2 - Authenticated Reflected Cross-Site Scripting (XSS) to Zomato - 4 upvotes, $0
- XSS in flashmediaelement.swf (business-blog.zomato.com) to Zomato - 4 upvotes, $0
- xss found in zomato to Zomato - 4 upvotes, $0
- CSRF AT SELECTING ZAMATO HANDLE to Zomato - 3 upvotes, $0
- XSS on zomato.com to Zomato - 3 upvotes, $0
- Clickjacking login page of http://book.zomato.com/ to Zomato - 3 upvotes, $0
- NexTable: Credentials exposure to Zomato - 3 upvotes, $0
- Clickjacking: Delete Account, Change privacy settings, Rate business, follow/unfollow (IE) to Zomato - 3 upvotes, $0
- Weak Password Policy to Zomato - 2 upvotes, $0
- Authentication Bypassing and Sensitive Information Disclosure on Verify Email Address in Registration Flow to Zomato - 2 upvotes, $0
- CSS to Zomato - 2 upvotes, $0
- URL is vulnerable to clickjacking to Zomato - 2 upvotes, $0
- XSS in "explore-keywords-dropdown" results. to Zomato - 2 upvotes, $0
- Cross Site Scripting - type Patameter to Zomato - 1 upvotes, $0
- Remote File Upload Vulnerability in business-blog.zomato.com to Zomato - 1 upvotes, $0
- XSS and CSRF in Zomato Contact form to Zomato - 1 upvotes, $0
- Reflected XSS on Zomato API to Zomato - 1 upvotes, $0
- Persistent XSS on Reservation / Booking Page to Zomato - 1 upvotes, $0
- Two XSS vulns in widget parameters (all_collections.php and o2.php) to Zomato - 1 upvotes, $0
- Unvalidated redirect on user profile website to Zomato - 1 upvotes, $0
- Lack of Password Confirmation for Account Deletion to Zomato - 1 upvotes, $0
- XSS via modified Zomato widget (res_search_widget.php) to Zomato - 0 upvotes, $0