Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/2/2010
05:24 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Google Offers Bucks For Bugs In Its Web Applications

New vulnerability reward program could set precedent in white-hat Web hacking

Google has launched a bold, experimental vulnerability reward program that pays researchers who discover legitimate, critical flaws in its Web applications -- including Google.com, Blogger.com, Orkut.com, and YouTube.com.

Web hacking traditionally has posed some tricky legal challenges for researchers. Google's new program encourages researchers to poke holes in its Web services and pays anywhere from $500 to $3,133.70 for a severe or "clever" vulnerability -- a move experts say could open the door for other cloud-based providers to do the same.

"Google is the first major company to come forward and invite attacks against its online in-production applications," says HD Moore, creator of Metasploit and chief security officer at Rapid7. "While security researchers have spent years testing software applications and reporting the findings, those that decided to take this approach online have faced legal challenges. This is a great precedent for the security community and will hopefully encourage other services providers to take a similar approach."

Google says its Web properties under the program include any that manage or show sensitive, authenticated user data or accounts, but its client apps, such as Picasa, Google Desktop, and Android, are off-limits for now.

The program comes on the heels of a similar program to reward bug finds in its Chromium software, which was started back in January.

Buying Web bugs from researchers is not the norm: HP TippingPoint's Zero Day Initiative, for example, doesn't purchase Web services vulnerabilities because the codebase changes so regularly and rapidly, says Aaron Portnoy, manager of the security research team at HP TippingPoint. "This is interesting because Google is kind of going into some uncharted territory," Portnoy says. "We've seen a lot of vulnerabilities in Facebook or YouTube or Google, but our policy is we don't buy them."

"Google is filling a gap we don't deal with," he adds. "This is nice to see because it means someone is going to be patching these."

The tricky part for Google, however, will be what it does with bugs it decides aren't bounty-worthy. "If they get a submission for one of their Web services and they don't deem it a big deal and don't want to pay out a bounty" nor fix it, then what? Portnoy says. "When you're the affected vendor, you get into some tricky territory."

Some researchers have begun challenging the tradition of disclosing their work for free to vendors. Companies such as Microsoft oppose exchanging currency for bugs, for example. "Researchers deserve getting paid for their work," says Aviv Raff, a researcher and CTO at Seculert, a cloud-based cyberthreat management service provider.

"It's good to see Google really encouraging researchers to search for bugs in their systems and help improve the security of their products and services. The cost of finding and fixing vulnerabilities can be quite high. Partnering with the research and white-hat hacking community can be a responsible and economical win-win for all," says Rick Moy, CEO of NSS Labs.

Google expects most of the accepted bugs will be cross-site scripting, cross-site request forgery, cross-site script inclusion, bypass of authorization controls, and server-side code execution or command injection.

No automated testing tools are allowed, nor are attacks against Google's corporate infrastructure, social engineering and physical attacks, denial-of-service bugs, non-Web application vulnerabilities, SEO blackhat techniques, vulnerabilities in Google-branded websites hosted by third parties, and flaws in any newly acquired technologies by Google, said Google security team members Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski in a blog post announcing the new program.

Participants must target only their own accounts or test accounts, Google said, and not try to gain access to another user's data.

As for disclosure: "We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release," they said in the post.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8344
PUBLISHED: 2020-09-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2020-8347
PUBLISHED: 2020-09-24
A reflective cross-site scripting (XSS) vulnerability was reported in Lenovo Enterprise Network Disk prior to version 6.1 patch 6 hotfix 4 that could allow execution of code in an authenticated user's browser if a crafted url is visited, possibly through phishing.
CVE-2020-8348
PUBLISHED: 2020-09-24
A DOM-based cross-site scripting (XSS) vulnerability was reported in Lenovo Enterprise Network Disk prior to version 6.1 patch 6 hotfix 4 that could allow execution of code in an authenticated user's current browser session if a crafted url is visited, possibly through phishing.
CVE-2020-15850
PUBLISHED: 2020-09-24
Insecure permissions in Nakivo Backup & Replication Director version 9.4.0.r43656 on Linux allow local users to access the Nakivo Director web interface and gain root privileges. This occurs because the database containing the users of the web application and the password-recovery secret value i...
CVE-2020-15851
PUBLISHED: 2020-09-24
Lack of access control in Nakivo Backup & Replication Transporter version 9.4.0.r43656 allows remote users to access unencrypted backup repositories and the Nakivo Controller configuration via a network accessible transporter service. It is also possible to create or delete backup repositories.