The piece the author is missing, and why zendesk likely ignored this is impact, and it's something I continually see submissions lacking. As a researcher, if you can't demonstrate impact of your vulnerability, then it looks like just another bug. A public program like zendesk is going to be swamped with reports, and they're using hackerone triagers to augment that volume. The triage system reads through a lot of reports - without clear impact, lots of vulnerabilities look like "just another bug". Notice that Zendesk took notice once mondev was able to escalate to an ATO[1]. That's impact, and that gets noticed![1] https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b...
patcon|1 year ago
Yes, the researcher could have tee'd himself up better, but this says way more about zendesk than it does about the 15-year-old researcher.
XCabbage|1 year ago
lysp|1 year ago
It's possible that some chains could have credentials or other sensitive information in ticket chains.
ec109685|1 year ago
Clearly Zendesk needs to change things so that the email address that is created for a ticket isn’t guessable.
Aachen|1 year ago
Of course, this is only a good strategy if you're just wanting to do a good deed and not counting on getting more than a thank you note, but Zendesk or Hackerone (whoever you want to blame here) didn't even accept the bug in the first place. That's the problem here, not the omission of an exploit chain
dclowd9901|1 year ago
thrdbndndn|1 year ago
tptacek|1 year ago
gavingmiller|1 year ago
davedx|1 year ago
23B1|1 year ago
gavingmiller|1 year ago