How My First Bug Turned into a Bounty
Author: Amine SAJID
Introduction
During a security assessment of a private program, I discovered an information disclosure that allows attackers to access sensitive information of 427 user (Payment preferences, personal info…)
Bug Type: Information Disclosure
Severity: Medium
The Hunt Begins
I got invited to a new private program, and the scope was: target.com, so subdomains were not in scope. I started hunting on the main domain and noticed that it interacted with a subdomain—let’s call it media.target.com. A quick search on the Wayback Machine (Archive) revealed a lot of PDF files named like 22434.pdf, 72452.pdf, and so on. These files contained payment receipts, which included sensitive information such as national identity numbers, names, addresses, phone numbers, and more.

I reported the bug, and it was accepted even though the subdomain wasn’t in scope. I received my bounty within a day.
Impact
Unauthorized access to user’s private information.
Recommended Fix
Move the PDF files to a secure private folder
Conclusion
This experience taught me that hunting out-of-scope bugs can still be effective, especially when they impact the main domain’s users. Additionally, out-of-scope targets are often overlooked by hackers, making it easier to uncover critical vulnerabilities. I reported the issue and earned a bounty, proving the value of exploring beyond the defined scope.
Final Thoughts:
The first bug has a special feeling, especially when you find it in a bug bounty program and get your effort paid off.

 
		


