A white hat hacker has earned $8,500 for a serious vulnerability that exposed the email addresses of HackerOne users.
Earlier this month, a hacker who uses the online moniker msdian7 discovered that a new feature introduced by the HackerOne bug bounty platform had resulted in a vulnerability that could have been exploited to obtain any HackerOne user’s email address.
The feature was introduced on February 10 and msdian7 found the vulnerability the next day. The vulnerability was patched within a few hours by HackerOne, and by the end of the day the company had sent out notifications to two individuals whose email addresses were exposed during the tests conducted by msdian7.
The security hole, described by HackerOne as an improper authorization issue, was related to the platform’s invitation system, which allows bug bounty program administrators to send out invitations to users. These invitations can be sent out to invite someone to a private program, to claim bounties, or be added to a program.
Invitations can be sent out to a username or an email address, but if a user is invited based on their username, the sender is not given access to that user’s email address for privacy purposes. This rule was enforced with access control lists (ACLs), but when HackerOne introduced a new protection layer the ACL rule was not properly implemented, thus exposing user email addresses.
The vulnerability could have been exploited for malicious purposes through HackerOne’s demo programs.
“HackerOne provides demo programs for customers to experience the product as well as hackers to test against our production system. When you are a team member in a demo program, you can demo the report interface. In the report interface, you can invite an external participant to the report, which could be any user on the platform. By generating that invitation with a username and then viewing the invitation, the user’s email could have been exposed,” HackerOne explained.
HackerOne awarded a $7,500 bounty for this vulnerability, along with a $1,000 bonus because the flaw was discovered less than 24 hours after the problematic feature was introduced. Details of the vulnerability were disclosed by HackerOne last week.
This is not the first time HackerOne has awarded a significant bounty for a vulnerability found in its platform. Last year, the company awarded a $20,000 bounty after a white hat hacker demonstrated that he could access private vulnerability reports.
Related: HackerOne Surpasses $82 Million in Paid Bounties
Related: Researcher Gets $5,000 for Severe Vulnerability in HackerOne

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Lyca Mobile Services Significantly Disrupted by Cyberattack
- Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware
- Qualcomm Patches 3 Zero-Days Reported by Google
- Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies
- Cybersecurity M&A Roundup: 28 Deals Announced in September 2023
- Companies Address Impact of Exploited Libwebp Vulnerability
- Number of Internet-Exposed ICS Drops Below 100,000: Report
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
Latest News
- Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day
- New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
- Lyca Mobile Services Significantly Disrupted by Cyberattack
- Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
- Google, Yahoo Boosting Email Spam Protections
- Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware
- Qualcomm Patches 3 Zero-Days Reported by Google
- Synqly Joins Race to Fix Security, Infrastructure Product Integrations
