Bio:
Hello, I'm Harsh, and I'm from India. I've been a regular contributor to the infosec community for the past five years. I worked as a full-time bug bounty hunter while gradually shifting to the other side of the fence. I started my career in industry with Zomato as a full-time security engineer. I'm currently working at Vimeo as an application security engineer. As a bug bounty hunter and security engineer, I'm particularly interested in server-side vulnerabilities, complex architecture design flaws, and unique bug classes, whether they're server or client-side. Though I no longer operate as a full-time bug bounty hunter, I do occasionally take part in bug bounties. Over the course of my bug bounty adventure, I've uncovered a number of bugs, including RCE in PayPal and Apple, which resulted in payouts of $30,000 and $50,000, respectively.
Talk Title:
A tale of making internet pollution free - Exploiting Client-Side Prototype Pollution in the wild
Abstract:
Prototype pollution, whether server-side or client-side, is a fascinating vulnerability. Prototype pollution might lead to various vulnerabilities depending on the application logic. This session will focus on the client-side prototype pollution studies that we conducted. We'll illustrate how we used our approaches to uncover pollution in over 18 widely used JavaScript libraries, as well as the 80 bugs reported to the VDPs. We found vulnerabilities in Apple.com, Jira Service Management, HubSpot Analytics, Segment Analytics, and the websites of several undisclosed companies, netting us a collective $40,000 in bug bounties.