Top reports from QIWI program at HackerOne:
- SQL injection on contactws.contact-sys.com in TScenObject action ScenObjects leads to remote code execution to QIWI - 467 upvotes, $5500
- Unauthenticated SSRF in jira.tochka.com leading to RCE in confluence.bank24.int to QIWI - 217 upvotes, $1000
- Remote Code Execution on contactws.contact-sys.com via SQL injection in TCertObject operation "Delete" to QIWI - 193 upvotes, $1000
- MobileIron Unauthenticated RCE on mdm.qiwi.com with WAF bypass to QIWI - 147 upvotes, $3500
- SQL injection on contactws.contact-sys.com in TRateObject.AddForOffice in USER_ID parameter leads to remote code execution to QIWI - 117 upvotes, $1000
- account takeover https://qiwi.me to QIWI - 106 upvotes, $750
- account takeover https://idea.qiwi.com/ to QIWI - 88 upvotes, $300
- Remote Code Execution on contactws.contact-sys.com via SQL injection in TAktifBankObject.GetOrder in parameter DOC_ID to QIWI - 84 upvotes, $2500
- SSRF на https://qiwi.com с помощью "Prerender HAR Capturer" to QIWI - 76 upvotes, $1500
- DOM XSS triggered in secure support desk to QIWI - 65 upvotes, $500
- Обход комиссии на переводы to QIWI - 56 upvotes, $1050
- account takeover through password reset in url https://reklama.tochka.com/ to QIWI - 56 upvotes, $500
- XXE on ██████████ by bypassing WAF ████ to QIWI - 53 upvotes, $5000
- Remote Code Execution on contactws.contact-sys.com via SQL injection in TPrabhuObject.BeginOrder in parameter DOC_ID to QIWI - 52 upvotes, $2500
- [contact-sys.com] SQL Injection████ limit param to QIWI - 50 upvotes, $250
- apache access.log leakage via long request on https://rapida.ru/ to QIWI - 42 upvotes, $100
- account takeover https://teamplay.qiwi.com to QIWI - 40 upvotes, $500
- XML External Entity (XXE) in qiwi.com + waf bypass to QIWI - 39 upvotes, $3137
- PIN OK attack to QIWI - 39 upvotes, $2000
- account impersonate through broken link to QIWI - 39 upvotes, $100
- [qiwi.me] Stored XSS to QIWI - 37 upvotes, $500
- [p2p.qiwi.com] nginx alias traversal to QIWI - 34 upvotes, $150
- Обход комиссии при оплате картой to QIWI - 32 upvotes, $1000
- [lk.contact-sys.com] SQL Injection reset_password FP_LK_USER_LOGIN to QIWI - 32 upvotes, $300
- XSS https://agent.postamat.tech/ в профиле + дисклоз секретной информации to QIWI - 31 upvotes, $200
- mysql.initial.sql file is accessable for everyone to QIWI - 30 upvotes, $100
- gifts.flocktory.com/phpmyadmin is vulnerable csrf to QIWI - 30 upvotes, $100
- Account takeover just through csrf in https://booking.qiwi.kz/profile to QIWI - 30 upvotes, $100
- HTTP Request Smuggling on api.flocktory.com Leads to XSS on Customer Sites to QIWI - 29 upvotes, $300
- [qiwi.com] XSS on payment form to QIWI - 28 upvotes, $550
- [QIWI Wallet] Access to protected app components to QIWI - 26 upvotes, $500
- Account Takeover through registration to the same email address to QIWI - 26 upvotes, $100
- CVE-2020-3187 - unauthenticated arbitrary file deletion in Cisco to QIWI - 25 upvotes, $500
- Обход комиссии на переводы to QIWI - 21 upvotes, $1000
- [lk.contact-sys.com] LKlang Path Traversal to QIWI - 21 upvotes, $150
- [contact-sys.com] XSS /ajax/transfer/status trn param to QIWI - 21 upvotes, $100
- [*.rocketbank.ru] Web Cache Deception & XSS to QIWI - 20 upvotes, $200
- IDOR редактирование любого вишлиста to QIWI - 19 upvotes, $500
- [id.rapida.ru] Full Path Disclosure to QIWI - 19 upvotes, $50
- crlf injection на https://bug.qiwi.com to QIWI - 18 upvotes, $100
- [send.qiwi.ru] Soap-based XXE vulnerability /soapserver/ to QIWI - 17 upvotes, $1000
- [qiwi.com] Oauth захват аккаунта to QIWI - 17 upvotes, $950
- Возможность регистрации на сайте qiwi.com на любой номер телефона to QIWI - 17 upvotes, $200
- Небезопасная схема выдачи номера карты QVC (возможно, также QVV и QVP) to QIWI - 17 upvotes, $200
- Information disclosure on https://paycard.rapida.ru to QIWI - 17 upvotes, $100
- [wallet.rapida.ru] XSS Cookie flashcookie to QIWI - 17 upvotes, $100
- broken authentication (password reset link not expire after use in https://network.tochka.com/sign-up) to QIWI - 16 upvotes, $100
- [ibank.qiwi.ru] XSS via Request-URI to QIWI - 15 upvotes, $150
- https://fundl.qiwi.com CSRF на подтверждении sms to QIWI - 15 upvotes, $100
- [sms.qiwi.ru] XSS via Request-URI to QIWI - 15 upvotes, $100
- Слив какого-то access токена to QIWI - 14 upvotes, $200
- [contact-sys.com] XSS via Request-URI to QIWI - 14 upvotes, $100
- Каким-то образом получил чужой платеж к себе на копилку https://qiwi.me/undefined to QIWI - 14 upvotes, $50
- Imformation Disclosure on id.rapida.ru to QIWI - 13 upvotes, $100
- [qiwi.com] Information Disclosure to QIWI - 12 upvotes, $150
- [XSS/pay.qiwi.com] Pay SubDomain Hard-Use XSS to QIWI - 12 upvotes, $150
- Nickname disclosure through web-chat to QIWI - 12 upvotes, $150
- [vitrina.contact-sys.com] Full Path Disclosure to QIWI - 12 upvotes, $100
- [qiwi.me] No limits on image download requests to QIWI - 12 upvotes, $100
- Subdomain Takeover on 1c-start.tochka.com pointing to unbouncepages to QIWI - 12 upvotes, $50
- hard-use account takeover qiwi.com to QIWI - 11 upvotes, $300
- [qiwi.com] .bash_history to QIWI - 11 upvotes, $100
- Раскрытие чувствительной информации composer.lock docker-compose.yml to QIWI - 9 upvotes, $100
- Раскрытие баланса на //kopilka.qiwi.com to QIWI - 8 upvotes, $300
- [XSS/3dsecure.qiwi.com] 3DSecure XSS to QIWI - 8 upvotes, $250
- [rubm.qiwi.com] Yui charts.swf XSS to QIWI - 8 upvotes, $200
- Xss on billing to QIWI - 8 upvotes, $200
- какой-то исходный код в корне сайта to QIWI - 8 upvotes, $50
- disclosing clients' secret keys https://stage-uapi.tochka.com:2000/ to QIWI - 7 upvotes, $150
- Open Redirect in meeting.qiwi.com to QIWI - 7 upvotes, $100
- [ibank.qiwi.ru] UI Redressing via Request-URI to QIWI - 6 upvotes, $150
- Stored xss in agent.qiwi.com to QIWI - 6 upvotes, $100
- Content Spoofing in mango.qiwi.com to QIWI - 5 upvotes, $150
- [z.tochka.com] Unlimited file uploads lead to malware executed to QIWI - 5 upvotes, $0
- Открытый доступ к корпоративным данным. to QIWI - 4 upvotes, $500
- [qiwi.com] Open Redirect to QIWI - 4 upvotes, $150
- Keychain data persistence may lead to account takeover to QIWI - 4 upvotes, $100
- https://teamplay.qiwi.com/ накрутка баллов => финансовые убытки для компании to QIWI - 3 upvotes, $500
- [wallet.rapida.ru] Mass SMS flood to QIWI - 3 upvotes, $200
- Session Cookie without HttpOnly and secure flag set to QIWI - 3 upvotes, $100
- [ishop.qiwi.com] XSS + Misconfiguration to QIWI - 2 upvotes, $200
- CRLF Injection [ishop.qiwi.com] to QIWI - 1 upvotes, $250
- [static.qiwi.com] XSS proxy.html to QIWI - 1 upvotes, $200
- [qiwi.com] /oauth/confirm.action XSS to QIWI - 1 upvotes, $100
- Code for registration of qiwi account is not coming even after a long interval of time for Indian mobile number to QIWI - 1 upvotes, $0
- Metadata in hosted files is disclosing Usernames, Printers, paths, admin guides. emails to QIWI - 1 upvotes, $0
- SSL Certificate on qiwi.com will expire soon. to QIWI - 1 upvotes, $0
- [send.qiwi.ru] XSS at auth?login= to QIWI - 0 upvotes, $200
- XSS Reflected in test.qiwi.ru to QIWI - 0 upvotes, $200