Vulnerabilities / Threats
11/2/2010
05:24 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Google Offers Bucks For Bugs In Its Web Applications

New vulnerability reward program could set precedent in white-hat Web hacking

Google has launched a bold, experimental vulnerability reward program that pays researchers who discover legitimate, critical flaws in its Web applications -- including Google.com, Blogger.com, Orkut.com, and YouTube.com.

Web hacking traditionally has posed some tricky legal challenges for researchers. Google's new program encourages researchers to poke holes in its Web services and pays anywhere from $500 to $3,133.70 for a severe or "clever" vulnerability -- a move experts say could open the door for other cloud-based providers to do the same.

"Google is the first major company to come forward and invite attacks against its online in-production applications," says HD Moore, creator of Metasploit and chief security officer at Rapid7. "While security researchers have spent years testing software applications and reporting the findings, those that decided to take this approach online have faced legal challenges. This is a great precedent for the security community and will hopefully encourage other services providers to take a similar approach."

Google says its Web properties under the program include any that manage or show sensitive, authenticated user data or accounts, but its client apps, such as Picasa, Google Desktop, and Android, are off-limits for now.

The program comes on the heels of a similar program to reward bug finds in its Chromium software, which was started back in January.

Buying Web bugs from researchers is not the norm: HP TippingPoint's Zero Day Initiative, for example, doesn't purchase Web services vulnerabilities because the codebase changes so regularly and rapidly, says Aaron Portnoy, manager of the security research team at HP TippingPoint. "This is interesting because Google is kind of going into some uncharted territory," Portnoy says. "We've seen a lot of vulnerabilities in Facebook or YouTube or Google, but our policy is we don't buy them."

"Google is filling a gap we don't deal with," he adds. "This is nice to see because it means someone is going to be patching these."

The tricky part for Google, however, will be what it does with bugs it decides aren't bounty-worthy. "If they get a submission for one of their Web services and they don't deem it a big deal and don't want to pay out a bounty" nor fix it, then what? Portnoy says. "When you're the affected vendor, you get into some tricky territory."

Some researchers have begun challenging the tradition of disclosing their work for free to vendors. Companies such as Microsoft oppose exchanging currency for bugs, for example. "Researchers deserve getting paid for their work," says Aviv Raff, a researcher and CTO at Seculert, a cloud-based cyberthreat management service provider.

"It's good to see Google really encouraging researchers to search for bugs in their systems and help improve the security of their products and services. The cost of finding and fixing vulnerabilities can be quite high. Partnering with the research and white-hat hacking community can be a responsible and economical win-win for all," says Rick Moy, CEO of NSS Labs.

Google expects most of the accepted bugs will be cross-site scripting, cross-site request forgery, cross-site script inclusion, bypass of authorization controls, and server-side code execution or command injection.

No automated testing tools are allowed, nor are attacks against Google's corporate infrastructure, social engineering and physical attacks, denial-of-service bugs, non-Web application vulnerabilities, SEO blackhat techniques, vulnerabilities in Google-branded websites hosted by third parties, and flaws in any newly acquired technologies by Google, said Google security team members Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski in a blog post announcing the new program.

Participants must target only their own accounts or test accounts, Google said, and not try to gain access to another user's data.

As for disclosure: "We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release," they said in the post.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.