Hacker gets Facebook's 'keys to the kingdom'

Powered by SC Magazine
 

Paid record $33,500 bounty for remote code execution flaw.

Facebook has paid out its largest cash reward of $33,500 for a serious remote code execution vulnerability which also returned critical administrative data from the social networking site.

The bounty was tied to a flaw in the implementation of OpenID, which has affected scores of websites since it was discovered in September 2012 by researcher Reginaldo Silva.

The bountry winner found that Facebook had used OpenID to allow users to access their accounts by logging into Gmail. After reading OpenID documentation, Silva learned that he could manipulate the process, known as a Yardis discovery, to replace Gmail for a provider he controlled.

With the alteration in place, he caused Facebook to issue a request to his URL, which replied with a request carrying malicious XML code.

The Facebook response included its etc/passwd which contained essential login information such as system adminstrator data and user IDs.

"By then I knew I had found the keys to the kingdom," Silva wrote.

"After all, having the ability to read (almost) any file and open arbitrary network connections through the point of view of the Facebook server, and which doesn't go through any kind of proxy was surely something Facebook wanted to avoid at any cost."

Silva reported the bug to Facebook who fixed the flaw in the time it took him to return from lunch, foiling his bid to escalate the bug to remote code execution.

Facebook still rewarded the researcher with the top bounty after confirming that his plans to escalate the bug would have been successful prior to the patch.

But the reward fell well short of what the bug was worth, CQR Consulting Chief Technology OPfficer Phil Kernick told ITnews.  

"It’s a clever bug which relies on interactions between multiple components and use of a badly designed specification.  So full marks to him," Kernick said.

"On the other hand I think that the amount that they paid him is far below the economic value of the bug – and this is a fundamental problem with all bug bounty programs.  He was honest, but could have made much more selling it."

Silva pointed out to Facebook's bug bounty team that its security chief Ryan McGeehan had told Bloomberg the company would pay out "a million-dollar bug" ahead of its deliberations as to the value of his vulnerability.

Facebook's Bug Bounty team said it issued an alert to all on-call security staff when Silva's well-written report of the XML external entities vulnerability was received.

The social network said the bug was not previously exploited.

"We knew we wanted to pay out a lot because of the severity of the issue, so we decided to average the payout recommendations across a group of our program administrators," the company wrote.

"As always, we design our payouts to reward the hard work of researchers who are already inclined to do the right thing and report bugs to the affected vendors."

Copyright © iTnews.com.au . All rights reserved.


Hacker gets Facebook's 'keys to the kingdom'
 
 
 
Top Stories
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
Photos: A tour of CommBank's new innovation lab
Oculus Rift, Kinect and more.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 223

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  64%
 
No
  36%
TOTAL VOTES: 64

Vote