Skip to content

Commit 15bb7f8

Browse files
authored
Merge pull request #562 from bugcrowd/grammar-fix-login-logout
Updates for Login to log in and logout to log out
2 parents f60a9ea + 73c0cfd commit 15bb7f8

File tree

87 files changed

+336
-294
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+336
-294
lines changed

submissions/description/automotive_security_misconfiguration/infotainment_radio_head_unit/default_credentials/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Default credentials in the IVI system can result in reputational damage and indi
88

99
1. Port scan the IVI unit by leveraging {{application}} and {{hardware}}
1010
1. Bruteforce default credentials on exposed service(s)
11-
1. Login to service(s) and run {{action}}
11+
1. Log in to service(s) and run {{action}}
1212
1. Observe that {{action}} occurs as a result
1313

1414
**Proof of Concept (PoC)**

submissions/description/broken_access_control/exposed_sensitive_android_intent/template.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t
99

1010
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
1111
1. Use a browser to navigate to: {{URL}}
12-
1. Login to an account that should not be able to perform {{action}}
12+
1. Log in to an account that should not be able to perform {{action}}
1313
1. Forward the following request to the endpoint:
1414

1515
```HTTP
@@ -20,6 +20,6 @@ This vulnerability can lead to reputational damage and indirect financial loss t
2020

2121
**Proof of Concept (PoC)**
2222

23-
The screenshot below demonstrates the broken access control:
24-
25-
{{screenshot}}
23+
The screenshot(s) below demonstrate(s) the vulnerability:
24+
>
25+
> {{screenshot}}

submissions/description/broken_access_control/exposed_sensitive_ios_url_scheme/template.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t
1010

1111
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
1212
1. Use a browser to navigate to: {{URL}}
13-
1. Login to an account that should not be able to perform {{action}}
13+
1. Log in to an account that should not be able to perform {{action}}
1414
1. Forward the following request to the endpoint:
1515

1616
```HTTP
@@ -21,6 +21,6 @@ This vulnerability can lead to reputational damage and indirect financial loss t
2121

2222
**Proof of Concept (PoC)**
2323

24-
The screenshot below demonstrates the broken access control:
25-
26-
{{screenshot}}
24+
The screenshot(s) below demonstrate(s) the vulnerability:
25+
>
26+
> {{screenshot}}

submissions/description/broken_access_control/idor/modify_sensitive_information_iterable_object_identifiers/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can lead to reputational damage for the business through the impact to cust
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/idor/modify_view_sensitive_information_guid/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can lead to reputational damage for the business through the impact to cust
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/idor/modify_view_sensitive_information_iterable_object_identifiers/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can lead to reputational damage for the business through the impact to cust
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/idor/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can lead to indirect financial loss through an attacker accessing, deleting
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/idor/view_non_sensitive_information/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can result in reputational damage for the business through the impact to cu
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/idor/view_sensitive_information_iterable_object_identifiers/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ IDOR can lead to reputational damage for the business through the impact to cust
77
**Steps to Reproduce**
88

99
1. Use a browser to navigate to: {{URL}}
10-
1. Login to User Account A
10+
1. Log in to User Account A
1111
1. In the URL bar, modify the parameter to a different value:
1212

1313
{{eg.<https://example.com/parameter(UserAccountB)>}}

submissions/description/broken_access_control/privilege_escalation/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ The impact of this vulnerability can vary in severity depending on the degree of
88

99
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
1010
1. Use a browser to navigate to: {{URL}}
11-
1. Login to User Account A
11+
1. Log in to User Account A
1212
1. Using the HTTP interception proxy, forward the following request to the endpoint:
1313

1414
```HTTP

0 commit comments

Comments
 (0)