Top reports from New Relic program at HackerOne:
- Password theft login.newrelic.com via Request Smuggling to New Relic - 455 upvotes, $3000
- Insecure Infrastructure Integrations YML Loading leads to Windows Privilege Escalation to New Relic - 61 upvotes, $2500
- Host Header Injection to New Relic - 58 upvotes, $500
- Stored XSS in Brower
namefield reflected in two pages to New Relic - 37 upvotes, $3000 - [NR Insights] Pull any Insights/NRQL data from any NR account to New Relic - 34 upvotes, $2500
- Bypass of my three other reports #267636 + #255894 + #271861 - (IDOR) Ability to see full name associated with other New Relic accounts to New Relic - 33 upvotes, $1500
- SSRF in alerts.newrelic.com exposes entire internal network to New Relic - 32 upvotes, $0
- The impossibility of inclusion of the trial (BROWSER) to New Relic - 26 upvotes, $200
- Users can enable API access for free via mass assignment to New Relic - 26 upvotes, $0
- Cache-Control Misconfiguration Leads to Sensitive Information Leakage to New Relic - 22 upvotes, $0
- Open redirection to New Relic - 17 upvotes, $0
- User to Admin privilege escalation in Infrastructure Conditions - /v2/accounts/1835740/alerts/conditions to New Relic - 16 upvotes, $500
- A user with restricted privileges is able to view Phone Number + Billing Email of account owner to New Relic - 16 upvotes, $0
- Mobile Authentication Endpoint Credentials Brute-Force Vulnerability to New Relic - 15 upvotes, $0
- NR Internal_API call allows me to read the events/violations/policies/messages of ANY New Relic account (AND pull data from infrastructure) to New Relic - 13 upvotes, $1000
- Missing rate limit on password to New Relic - 13 upvotes, $0
- Blind SSRF in Ticketing Integrations Jira webhooks leading to internal network enumeration and blind HTTP requests to New Relic - 13 upvotes, $0
- Giving myself access to NR1 UI / one.newrelic.com without the proper feature flags on my account to New Relic - 12 upvotes, $500
- Blind SSRF on synthetics.newrelic.com to New Relic - 12 upvotes, $0
- APT repository is signed using weak digest (SHA-1) to New Relic - 12 upvotes, $0
- Internal Ports Scanning via Blind SSRF to New Relic - 12 upvotes, $0
- SSO Authentication Bypass to New Relic - 11 upvotes, $0
- CSRF- delete all empty server policy to New Relic - 11 upvotes, $0
- [docs-ra.newrelic.com] subdomain and Drupal takeover via unconfigured endpoint to New Relic - 11 upvotes, $0
- stamp2-azure-ext.newrelic.com is vulnerable to MS12-020 to New Relic - 11 upvotes, $0
- Swiftype key stored in JavaScript source to New Relic - 11 upvotes, $0
- No validation on account names to New Relic - 9 upvotes, $0
- newrelic.atlassian.net - jira information disclosure to New Relic - 9 upvotes, $0
- Captcha Bypass on SignUp Form to New Relic - 9 upvotes, $0
- Vulnerable Link Leaks the User Names to New Relic - 8 upvotes, $0
- https://rpm.newrelic.com/login vulnerable to host header attack to New Relic - 8 upvotes, $0
- Drupal admin takeover via install.php not being performed prior to install. to New Relic - 8 upvotes, $0
- Mixed content issues on newrelic.com to New Relic - 8 upvotes, $0
- SSRF on synthetics.newrelic.com permitting access to sensitive data to New Relic - 7 upvotes, $0
- Session Management Flaw to New Relic - 7 upvotes, $0
- CSRF vulnerability that allows an attacker to purge plugin metric data to New Relic - 7 upvotes, $0
- Leaking license key in source code to New Relic - 7 upvotes, $0
- Cache purge requests are not authenticated to New Relic - 7 upvotes, $0
- CSRF For Adding Users to New Relic - 7 upvotes, $0
- [Bypass] Code injection to open redirect in https://insights.newrelic.com/accounts/2521182/dashboards/1026927 to New Relic - 7 upvotes, $0
- Open redirection on login to New Relic - 6 upvotes, $0
- Sensitive information contained with New Relic APM iOS application to New Relic - 6 upvotes, $0
- Potential sub-domain hijacking to New Relic - 6 upvotes, $0
- CSRF - Delete all empty application policy to New Relic - 6 upvotes, $0
- Session Hijacking to New Relic - 6 upvotes, $0
- Bypass of my two other reports #267636 + #255894 - (IDOR) Ability to see full name associated with other New Relic accounts to New Relic - 6 upvotes, $0
- [NR Infrastructure] Bypass of #200576 through GraphQL query abuse - allows restricted user access to root account license key to New Relic - 5 upvotes, $750
- CSV Injection in sub_accounts.csv to New Relic - 5 upvotes, $0
- JIRA account misconfig causes internal info leak to New Relic - 5 upvotes, $0
- /accounts/USERID.json file is left open for Restricted User of organization disclosing Owners's Mobile Number and "billing_info, cc_email" to New Relic - 5 upvotes, $0
- Restricted User is able to edit Alert Conditions of Synthetics Monitors even if Synthetics Permissions is enabled by an admin to New Relic - 5 upvotes, $0
- Privilege Escalation in Default Notification Preferences to New Relic - 5 upvotes, $0
- Missing security best practices (leads to further impact) to New Relic - 5 upvotes, $0
- Manipulation of submit payment request allows me to obtain Infrastructure Pro/Other Services for free or at greatly reduced price to New Relic - 4 upvotes, $600
- Open redirection bypass to New Relic - 4 upvotes, $0
- Normal user can set "Job title" of other users by Direct Object Reference to New Relic - 4 upvotes, $0
- http://newrelic.com SSRF/XSPA to New Relic - 4 upvotes, $0
- User enumeration possible from log-in timing difference to New Relic - 4 upvotes, $0
- newrelic.com rails directory traversal vuln to New Relic - 4 upvotes, $0
- Improper Session Management to New Relic - 4 upvotes, $0
- Privilege Escalation In Moniter to New Relic - 4 upvotes, $0
- [alerts.newrelic.com] Scanning local network via notification channel to New Relic - 4 upvotes, $0
- No Rate Limitation on Promo Code to New Relic - 4 upvotes, $0
- Restricted User can view multiple account details including customer_root_account_id, payment method, date of first payment, etc. to New Relic - 4 upvotes, $0
- Cross site scripting in a subdomain of newrelic.com to New Relic - 4 upvotes, $0
- Stored XSS on BillingCountry parameter to New Relic - 4 upvotes, $0
- SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability to New Relic - 4 upvotes, $0
- Hyperlink Injection on adding active users to New Relic - 4 upvotes, $0
- Bypassing Protection Mechanism: Change of Account Name after Session Log out to New Relic - 4 upvotes, $0
- New Relic - Session Hijacking to New Relic - 3 upvotes, $0
- https://rpm.newrelic.com/.htaccess file is world readable to New Relic - 3 upvotes, $0
- Basic Authorization over HTTP to New Relic - 3 upvotes, $0
- Login Open Redirect to New Relic - 3 upvotes, $0
- Unsafe HTML in reset password email and Account verification in email is missing in Sign up to New Relic - 3 upvotes, $0
- Password disclosure during signup process to New Relic - 3 upvotes, $0
- HOST HEADER INJECTION in rpm.newrelic.com to New Relic - 3 upvotes, $0
- Open redirection to New Relic - 3 upvotes, $0
- Cookie Misconfiguration to New Relic - 3 upvotes, $0
- Open redirection bypass . to New Relic - 3 upvotes, $0
- [download.newrelic.com] Access to private directories to New Relic - 3 upvotes, $0
- Html injection in monitor name textbox to New Relic - 3 upvotes, $0
- A Signup page does not properly validate the authenticity token at the server side. to New Relic - 3 upvotes, $0
- XSS in a newrelic.com site to New Relic - 3 upvotes, $0
- Open Redirect to New Relic - 3 upvotes, $0
- Sub domain issues. to New Relic - 3 upvotes, $0
- CRLF Injection in email address to New Relic - 3 upvotes, $0
- Old CAPTCHA offers no protection to New Relic - 2 upvotes, $0
- Stored Cross-Site Scripting via Angular Template Injection to New Relic - 2 upvotes, $0
- SUBDOMAIN TAKEOVER(FIXED) to New Relic - 2 upvotes, $0
- [login.newrelic.com] XSS via return_to to New Relic - 2 upvotes, $0
- Potential Subdomain Takeover - http://storefront.newrelic.com/ to New Relic - 2 upvotes, $0
- No CSRF validation on Account Monitors in Synthetics Block to New Relic - 2 upvotes, $0
- newrelic.com vulnerable to clickjacking ! to New Relic - 2 upvotes, $0
- no email confirmation on signup to New Relic - 2 upvotes, $0
- All the active session should destroy when user change his password to New Relic - 2 upvotes, $0
- Login CSRF vulnerability to New Relic - 2 upvotes, $0
- Java RMI (Remote Code Execution) to New Relic - 2 upvotes, $0
- Host Header Injection / Cache Poisoning to New Relic - 2 upvotes, $0
- open redirection at login to New Relic - 2 upvotes, $0
- A Log in page does not properly validate the authenticity token at the server side to New Relic - 2 upvotes, $0
- Unauthorized Access to New Relic - 2 upvotes, $0
- Reflected XSS on Signup Page to New Relic - 2 upvotes, $0
- Privilege Escalation in Share Report to New Relic - 2 upvotes, $0
- Unvalidated redirect in alerts.newrelic.com/auth/newrelic?origin= to New Relic - 2 upvotes, $0
- DNS misconfiguration on email.alerts.newrelic.com to New Relic - 2 upvotes, $0
- WordPress username enumeration (/author) to New Relic - 2 upvotes, $0
- Synthetics Xss to New Relic - 1 upvotes, $0
- Too many included lookups to New Relic - 1 upvotes, $0
- Clickjacking on authenticated pages which is inscope for New Relic to New Relic - 1 upvotes, $0
- Stored XSS through Angular Expression Sandbox Escape to New Relic - 1 upvotes, $0
- Session takeover to New Relic - 1 upvotes, $0
- rpm.newrelic.com - monitor creation to other accounts to New Relic - 1 upvotes, $0
- Html injection in monitor name textbox to New Relic - 1 upvotes, $0
- All Active user sessions should be destroyed when user change his password! to New Relic - 1 upvotes, $0
- Server Side Browsing - localhost open port enumeration to New Relic - 1 upvotes, $0
- CSRF - Regenerate all admin api keys to New Relic - 1 upvotes, $0
- Emails and alert policies can be altered by malicious users. to New Relic - 1 upvotes, $0
- Stored Xss in rpm.newrelic.com to New Relic - 1 upvotes, $0
- Directory listing - i am able to download all php_agent archive to New Relic - 1 upvotes, $0
- WordPress User Enumeration - blog.newrelic.com to New Relic - 1 upvotes, $0
- Can fake content email of newrelic to any user to New Relic - 1 upvotes, $0
- Moniter Failed Sends too many emails to New Relic - 0 upvotes, $0
- Sensitive information disclosure to New Relic - 0 upvotes, $0
- Insecure transition from HTTP to HTTPS in form post to New Relic - 0 upvotes, $0
- XSS (Reflected) to New Relic - 0 upvotes, $0
- Broken Authentication and session management OWASP A2 to New Relic - 0 upvotes, $0
- Newrelic s3 bucket is writeable and deleteable by authorized AWS users to New Relic - 0 upvotes, $0