InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

💰$100 Bounty: Username Restriction Bypassed

Abhijeet Kumawat
InfoSec Write-ups
Published in
3 min readFeb 25, 2025

--

🚀Free Article Link

Hello, fellow hackers! 👋 In this writeup, I’m excited to share how I discovered a Username Restriction Bypass vulnerability on a popular social media platform (name redacted for privacy) during a HackerOne Bug Bounty Program, which rewarded me with a sweet $100 bounty. 💵

This flaw allowed the creation of fake usernames and fake organisations, leading to serious impersonation issues. Curious about how it was done? Let’s dive right in! 🚀

Created by DALL.E

🔎 What’s the Issue?

The platform enforced username restrictions, allowing only alphanumeric characters (A-Z, 0–9) with the exception of underscores (_). However, I discovered a way to bypass these restrictions and create usernames with special characters, making them unviewable or misleading.

🤔 Why is This Dangerous?

Attackers could exploit this to:

  • Create fake profiles that are not viewable or traceable.
  • Bypass bans on specific users by recreating their profiles with slight variations (e.g., L!sa instead of Lisa).
  • Impersonate legitimate users or organizations by using visually similar characters (e.g., L i s a with spaces).

This could mislead platform administrators during report reviews or when verifying user identities, potentially allowing banned users to bypass restrictions or engage in impersonation. ⚠️

💰$1000 Bounty: Command Injection Vulnerability🔓Free Article Link: Click Here medium.com

🔥 How I Did It: Step-by-Step Exploit

[1] Navigate to the Profile Section:

  • Go to: https://redacted.com/profiles/
  • Edit your username and attempt to add special characters (e.g., !, ., or space).
  • Notice the error message: “Only letters (A-Z), numbers (0–9), and underscores (_) are allowed.”

[2] Bypass Using Burp Suite:

  • Enter a valid username (e.g., Lisa123) and click Save.
  • Capture the request using Burp Suite and send it to the repeater.
  • In the repeater tab, modify the

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Abhijeet Kumawat

Radhe Radhe ✨ || Jr. Security Consultant || Security Researcher || Bug Hunter || Web Application Penetration Tester || Ethical Hacker ||

Responses (3)

Write a response