Hyperledger - HackerOne Reports
View on HackerOne26
Total Reports
1
Critical
10
High
4
Medium
3
Low
Enrolling to a CA that returns an empty response crashes the node process
Reported by:
mttrbrts
|
Disclosed:
Medium
Weakness: Uncontrolled Resource Consumption
Bounty: $500.00
[indy_node]POOL_UPGRADE command injection, Trustee Node can execute command in any other Node`s system.
Reported by:
kmhlyxj0
|
Disclosed:
Weakness: OS Command Injection
POOL_UPGRADE request handler may allow an unauthenticated attacker to remotely execute code on every node in the network.
Reported by:
shakedreiner
|
Disclosed:
Critical
Weakness: Command Injection - Generic
Bounty: $2000.00
DOS validator nodes of blockchain to block external connections
Reported by:
cre8
|
Disclosed:
High
Weakness: Uncontrolled Resource Consumption
Bounty: $1500.00
Fix : (Security) Mitigate Path Traversal Bug
Reported by:
bhaskar_ram
|
Disclosed:
Low
Weakness: Path Traversal
Bounty: $200.00
CVE-2017-5929: Hyperledger - Arbitrary Deserialization of Untrusted Data
Reported by:
mik-patient
|
Disclosed:
CVEs:
CVE-2017-5929
Previous
Page 2 of 2