Analytics

5/30/2018
06:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System

In less than one month, security researchers participating in the Pentagon's Hack the Defense Travel System program found 65 vulnerabilities.

White-hat hackers participating in a US Department of Defense bug bounty initiative recently rooted out 65 unique security vulnerabilities in the Defense Travel System (DTS), an enterprise application used by millions of DoD workers worldwide.

In less than one month, more than two dozen of the uncovered flaws — 28 — were flagged as high or critical in severity, according to HackerOne, the entity that managed the initiative for the DoD.

The DoD's Hack the DTS (Defense Travel System) contest is part of a broader DoD crowd-sourced bug hunting initiative called Hack the Pentagon. It's the fifth time the DoD has used such a program to try and proactively find vulnerabilities in important systems that its own security organizations might have missed. So far, since its launch in April 2016, the Hack the Pentagon program has helped the DoD find and fix some 3,600 vulnerabilities in total.

The Hack the DTS program ran from April 1 to April 29. A total of 19 security researchers participated in it and employed a bag of tricks including social engineering to try and find vulnerabilities in DTS that could be exploited. To be eligible to participate, the security researchers had to be citizens of or be eligible to work in the US, UK, Australia, Canada, or New Zealand.

In the 29 days that the program ran, the researchers reported a total of 100 vulnerabilities, of which 65 were confirmed to be valid issues. Sixteen of them were uncovered less than 24 hours after the Hack the DTS challenge launched.

Researchers who reported valid security flaws received varying bug bounties. Eight of the reported vulnerabilities garnered the maximum bounty of $5,000. In all, the DoD paid out a total of $78,650 to the security researchers who discovered the vulnerabilities.

Crowd-sourced bug hunting programs such as those managed by HackerOne, Bugcrowd, and Synack have surged in popularity in recent years. The programs have attracted tens of thousands of security researchers from around the world willing to find and disclose security vulnerabilities in return for monetary rewards.

For many organizations, the programs have offered a way to let outside security researchers take a crack at their websites and apps in a relatively controlled and managed environment.

For security researchers, bug bounty programs have offered an opportunity to monetize their bug hunting and vulnerability discovery work. Bug hunters can earn anything from a few hundred dollars for low-level submissions to tens- and even hundreds of thousands of dollars for major bug discoveries.

For organizations, the programs have offered a way to discover and fix flaws they might have otherwise missed, often at considerably lower cost than recruiting full-time employees to do it.

The model, says HackerOne CEO Marten Mickos, has been gaining traction within government as well.

"When Hack the Pentagon was launched in 2016, it marked a change in the entire industry," he says. "The world's most powerful organization decided it needed the help of external hackers to be secure."

Other federal agencies and corporations worldwide have taken the cue from DoD and have launched similar hacker-powered security programs, he says. Last year's bill directing the Department of Homeland security to launch a Hack the DHS program is one example of the continued momentum. The Singapore Ministry of Defense, the European Commission, and the tax authorities in Finland are all other examples, Mickos says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devidlaws
50%
50%
Devidlaws,
User Rank: Apprentice
5/31/2018 | 5:05:08 AM
Router
Hey, I read the article it was great for everyone. My friends are suggested me to read it. So that they are true it was great. But if you want to know more about it then visit the site. Internet Explorer 10 customer service.
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-13435
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method to disable passcode authentication. NOTE: the vendor indicates that this is not an attack of interest w...
CVE-2018-13446
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. ...
CVE-2018-14567
PUBLISHED: 2018-08-16
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
CVE-2018-15122
PUBLISHED: 2018-08-16
An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.
CVE-2018-11509
PUBLISHED: 2018-08-16
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.