Hacker gets Facebook's 'keys to the kingdom'

By on
Hacker gets Facebook's 'keys to the kingdom'

Paid record $33,500 bounty for remote code execution flaw.

Facebook has paid out its largest cash reward of $33,500 for a serious remote code execution vulnerability which also returned critical administrative data from the social networking site.

The bounty was tied to a flaw in the implementation of OpenID, which has affected scores of websites since it was discovered in September 2012 by researcher Reginaldo Silva.

The bountry winner found that Facebook had used OpenID to allow users to access their accounts by logging into Gmail. After reading OpenID documentation, Silva learned that he could manipulate the process, known as a Yardis discovery, to replace Gmail for a provider he controlled.

With the alteration in place, he caused Facebook to issue a request to his URL, which replied with a request carrying malicious XML code.

The Facebook response included its etc/passwd which contained essential login information such as system adminstrator data and user IDs.

"By then I knew I had found the keys to the kingdom," Silva wrote.

"After all, having the ability to read (almost) any file and open arbitrary network connections through the point of view of the Facebook server, and which doesn't go through any kind of proxy was surely something Facebook wanted to avoid at any cost."

Silva reported the bug to Facebook who fixed the flaw in the time it took him to return from lunch, foiling his bid to escalate the bug to remote code execution.

Facebook still rewarded the researcher with the top bounty after confirming that his plans to escalate the bug would have been successful prior to the patch.

But the reward fell well short of what the bug was worth, CQR Consulting Chief Technology OPfficer Phil Kernick told ITnews.  

"It’s a clever bug which relies on interactions between multiple components and use of a badly designed specification.  So full marks to him," Kernick said.

"On the other hand I think that the amount that they paid him is far below the economic value of the bug – and this is a fundamental problem with all bug bounty programs.  He was honest, but could have made much more selling it."

Silva pointed out to Facebook's bug bounty team that its security chief Ryan McGeehan had told Bloomberg the company would pay out "a million-dollar bug" ahead of its deliberations as to the value of his vulnerability.

Facebook's Bug Bounty team said it issued an alert to all on-call security staff when Silva's well-written report of the XML external entities vulnerability was received.

The social network said the bug was not previously exploited.

"We knew we wanted to pay out a lot because of the severity of the issue, so we decided to average the payout recommendations across a group of our program administrators," the company wrote.

"As always, we design our payouts to reward the hard work of researchers who are already inclined to do the right thing and report bugs to the affected vendors."

Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
Flash is heading towards its grave, and that's...
Great! Good riddance
Sad! Flash had some good qualities
Irrelevant. I don't care
What's Flash?
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?