Kim Dotcom's Mega details first wave of security bugs

Powered by SC Magazine
 

Netted through bug bounty program.

Cloud storage service Mega has released details of the first wave of vulnerabilities identified under its bug bounty program.

Founder Kim DotCom launched the program earlier this month and offered a maximum $13,000 (10,000 euros) to those who could break the site's security. 

Bugs are classified from severity six which include "fundamental and generally exploitable cryptography design flaws" down to level one encapsulating "all lower-level impact or purely theoretical scenarios".

The most severe of the reported vulnerabilities is an "invalid application of CBC-MAC as a secure hash to integrity-check active content loaded from the distributed static content cluster" which led only to man-in-the-middle risks, a Mega blog post read.

Other flaws relate to cross site scripting and bad headers.

"It is clear that the vulnerabilities identified so far could all be found by checking only a few lines of code at a time; none of them required any analysis at a higher level of abstraction," a blog post stated, adding that Mega's cryptographic brute-force challenges have not been cracked: "Please check back in a few billion billion years". 

Mega chief technology officer Mathias Ortmann said the vulnerable Flash file was taken down while a fix was developed.

"After the ZeroClipboard debacle, we should have known better, but our ActionScripter was not instructed properly," Ortmann said.

Detectify security researcher Frans Rosen scored $1300 for XSS vulnerabilities related to flash files.

"One of the Flash files [sent] over unsanitised parameters back to the JavaScript and as soon as I had that I was able to inject some exploit code and [create] an attack vector executing JavaScript code on their platform," Rosen said.

"Mega has a limited amount of vectors to inject into: you have files to upload, directories for the files and your account information.

"Mega right now could isolate quite good because they have limited [attack] vectors but right now they are launching (social media platform) Megabox … which creates a lot of new vectors."

He said Mega's public boasting that it has a strong security posture encouraged researchers to hunt for bugs.

Copyright © SC Magazine, Australia


Kim Dotcom's Mega details first wave of security bugs
 
 
 
Top Stories
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  24%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 299

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 110

Vote