Hacker gets Facebook's 'keys to the kingdom'

Powered by SC Magazine
 

Paid record $33,500 bounty for remote code execution flaw.

Facebook has paid out its largest cash reward of $33,500 for a serious remote code execution vulnerability which also returned critical administrative data from the social networking site.

The bounty was tied to a flaw in the implementation of OpenID, which has affected scores of websites since it was discovered in September 2012 by researcher Reginaldo Silva.

The bountry winner found that Facebook had used OpenID to allow users to access their accounts by logging into Gmail. After reading OpenID documentation, Silva learned that he could manipulate the process, known as a Yardis discovery, to replace Gmail for a provider he controlled.

With the alteration in place, he caused Facebook to issue a request to his URL, which replied with a request carrying malicious XML code.

The Facebook response included its etc/passwd which contained essential login information such as system adminstrator data and user IDs.

"By then I knew I had found the keys to the kingdom," Silva wrote.

"After all, having the ability to read (almost) any file and open arbitrary network connections through the point of view of the Facebook server, and which doesn't go through any kind of proxy was surely something Facebook wanted to avoid at any cost."

Silva reported the bug to Facebook who fixed the flaw in the time it took him to return from lunch, foiling his bid to escalate the bug to remote code execution.

Facebook still rewarded the researcher with the top bounty after confirming that his plans to escalate the bug would have been successful prior to the patch.

But the reward fell well short of what the bug was worth, CQR Consulting Chief Technology OPfficer Phil Kernick told ITnews.  

"It’s a clever bug which relies on interactions between multiple components and use of a badly designed specification.  So full marks to him," Kernick said.

"On the other hand I think that the amount that they paid him is far below the economic value of the bug – and this is a fundamental problem with all bug bounty programs.  He was honest, but could have made much more selling it."

Silva pointed out to Facebook's bug bounty team that its security chief Ryan McGeehan had told Bloomberg the company would pay out "a million-dollar bug" ahead of its deliberations as to the value of his vulnerability.

Facebook's Bug Bounty team said it issued an alert to all on-call security staff when Silva's well-written report of the XML external entities vulnerability was received.

The social network said the bug was not previously exploited.

"We knew we wanted to pay out a lot because of the severity of the issue, so we decided to average the payout recommendations across a group of our program administrators," the company wrote.

"As always, we design our payouts to reward the hard work of researchers who are already inclined to do the right thing and report bugs to the affected vendors."

Copyright © iTnews.com.au . All rights reserved.


Hacker gets Facebook's 'keys to the kingdom'
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
IBM, NEC picked for major NSW Transport deals
Final contract negotiations begin.
 
Uncapped fees to drive digital agenda at universities
University CIOs look to provide the 'wow' factor.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1025

Vote