TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Instagram's Million Dollar Bug (2015)

201 点作者 tslocum超过 4 年前

15 条评论

TravisLS超过 4 年前
Previous discussion (5 years ago): <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10754194" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10754194</a>
评论 #25427560 未加载
albntomat0超过 4 年前
(my comment is on the overall trend, as the specifics on this incident are complex)<p>The issues with bug bounties as a whole is the market is skewed. For any work done by a bug bountier, there is exactly one legitimate buyer, who gets to make a significant judgement call on the value of the work done. Furthermore, this value is decided upon after the work has been completed, and has been provided to the company. In what other industries is this the case?<p>Alternatively, triagers have a whole pile of crap to wade through, to get to the useful material.<p>Furthermore, it really is hard to place an accurate monetary value on a bug that&#x27;s responsibly reported, and patched. This is in part due to unclear monetary results from being breached. What precisely is the monetary loss from the recent MS Teams bug that was reported but not exploited vs the incidents this year at Twitter and SolarWinds?<p>Having had some involvement in the bug bounty arena as a reporter, I have to say I&#x27;m a big fan of those companies that open up all of their reports after a fix period of time. This allows them to build trust with those who look into their products, and develop a reputation for being prompt and consistent.
评论 #25427168 未加载
评论 #25427475 未加载
评论 #25427188 未加载
Zee2超过 4 年前
God, this is frustrating. They essentially cracked Instagram&#x27;s entire production environment open, and took explicit steps at every turn to stay within the published guidelines, and then they just take his report with zero compensation whatsoever. Insane.
评论 #25423947 未加载
评论 #25428612 未加载
评论 #25427535 未加载
评论 #25424114 未加载
评论 #25424192 未加载
typenil超过 4 年前
Ah nice. Facebook resorts to intimidating bug bounty participants acting in good faith by threatening them through their employer instead of talking.<p>Can&#x27;t say I&#x27;m surprised, given the level of ethics Facebook exhibits at every conceivable level.
评论 #25424288 未加载
paxys超过 4 年前
This was discussed at length when it was first submitted here 5 years ago. The researcher found a (known) exploit, claimed $2500, then a month later used internal details he gathered (and saved) from the first exploit to breach the system further to demand a bigger payout.
评论 #25424206 未加载
paulpauper超过 4 年前
The problem with bug bounties is they are one-sided, against the researcher. The conditions of bounties typically stipulate that any attempt at negotiation can be interpreted as extortion, so it is either take it or leave it.
评论 #25425899 未加载
评论 #25424367 未加载
评论 #25425676 未加载
NiceWayToDoIT超过 4 年前
So, to summarize, you go to bank and you say &quot;your back door is vulnerable can you check&quot;, instead of checking and giving you some kind of praise, they call police to beat the hell out of you...<p>This is exactly sort of thing that will make community of white hackers stop caring, and leave open door to foreign agency malicious hackers to do as they please.<p>I would like to know what was really going inside of their heads, was someone internally trying to steal the thunder, was it vanity&#x2F;pride, was it lack of funds?!, was it fear?
评论 #25428604 未加载
评论 #25428231 未加载
fireattack超过 4 年前
Off topic, but there is a bug on Instagram that has been bothered me for quite a while.<p>On web (not sure about the app), if your language is Japanese, for any profile that has 0 following, it will show &quot;Following: 0&quot; as &quot;フォロー中NaN人&quot;. A screenshot for the lazy: <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;rTGXe3T.png" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;rTGXe3T.png</a><p>Of course this is a rather minor issue, but it still feels weird to me that one of the most popular website&#x2F;service in the world would have this kind of bug live so long (and yes, I have reported it multiple times).
评论 #25426659 未加载
评论 #25427393 未加载
blakesterz超过 4 年前
I tried a little searching but I can&#x27;t find anything that says how this all ended. Alex Stamos denied saying anything bad. But then what? It looks like it was all just dropped pretty much as is?
评论 #25424825 未加载
paulpauper超过 4 年前
There is no real bug besides the ruby RCE thing. Cracking weak passwords is not eligible. Sorry. I can see why Facebook denied him a remittance but their approach of contacting his employer was wrong.
评论 #25427477 未加载
umvi超过 4 年前
Any closure on this? Did FB ever make amends? Surely there are some FB security employees on HN.
julianmcolina超过 4 年前
Million dollar bug actually sounds like a small amount given the context!
thaumasiotes超过 4 年前
This speaks to a couple of issues that bothered me while working in bug bounty triage.<p>&gt; Alex informed my employer (as far as I am aware) that I had found a vulnerability, and had used it to access sensitive data. He then explained that <i>the vulnerability I found was trivial and of little value</i>, and at the same time said that my reporting and handling of the vulnerability submission had caused huge concern at Facebook.<p>[my emphasis]<p>There is this conceptual separation between the severity of the issue and the impact. Simplifying things much further than the situation described in the piece, you could have an admin account with the password &quot;password&quot;. This is a stupid issue. The fix is to change the admin password. How much of a bounty should be paid for this report?<p>One school of thought is that the value of the report is related to what you can accomplish by exploiting it. This is clearly the right approach if you&#x27;re assessing the issue&#x27;s value <i>to an attacker</i>. It has some problems in the bug bounty context -- a major one is that it feels subjectively unfair to the company! They don&#x27;t want to pay 100x more for the same vulnerability just because, this time, it happened to have more sensitive stuff behind it.<p>Another is that, as here, you often see a chain of vulnerabilities, all of which are of very little consequence in isolation, but they happen to combine into something much greater than the sum of the parts. (I recall a published writeup, which I can no longer find, in which one important step was a logout CSRF. Nobody cares about those.) The policy of &quot;stop investigating as soon as you find anything&quot; rules out this kind of &quot;whole is greater than the sum of the parts&quot; finding by definition.<p>&gt; Playing By The Rules<p>&gt; Microsoft (in my opinion), has done the best job of explaining exactly how far they would like a researcher to take a vulnerability. Google and Yahoo imply that you should report a vulnerability immediately, but do not clarify how far you should go in determinining impact. Tumblr, on the other hand, puts in writing the policy of just about every bounty program. The better your PoC shows impact, the more you are likely to get paid. Further, the better a researcher can understand and describe impact, the more likely they are to receive a greater reward.<p>This bothers me from a fairness perspective. I have personally seen essentially the same report on different pages of a webapp get paid out differently because the researchers provided different <i>speculation</i> about what might be possible using their exploit. The guy who got paid less was careful about following the rules, asking for guidance about exactly what and how he could investigate, and then he only claimed what he was able to demonstrate. The guy who got paid more had a more generic claim that &quot;this demonstrates SQLi, and writing to the database might be possible&quot;. I could not establish whether writing to the database <i>was in fact possible</i> for the same reason the first guy (and the second guy) didn&#x27;t try -- it might have been unacceptably disruptive to the company. So I passed the speculation through, and the payout ended up being higher.<p>The lesson here is, &quot;claim the moon and the stars.&quot; But I feel that means the ecosystem is unhealthy; that&#x27;s not what I think the lesson <i>should be</i>.<p>Companies always say they will investigate the full impact of a vulnerability when you follow the protocol they urge of &quot;as soon as you find something, report it and don&#x27;t try to escalate&quot;. But this is nearly impossible to do even if you&#x27;re trying in good faith.<p>---<p>Sometimes you&#x27;re not trying in good faith. I have also seen what is exactly the same issue paid out differently depending on the category the researcher files it under. Many programs publish payout schedules by category. In this case, the schedule contained a mix of technical category types (&quot;XSS&quot;) and functional category types (&quot;account takeover&quot;). One researcher found a way to present an issue in a low-paying technical category as a high-paying functional category. I repeatedly noted in my reports to the company that this researcher was getting paid quite a lot more for the same vulnerability than other researchers who didn&#x27;t know about the loophole. This state of affairs never changed; I assume the main concern was maintaining the relationship with the loophole guy. But obviously, this sort of thing directly falsifies the claim that &quot;we will investigate the full impact of the issue you report and pay out appropriately.&quot;
评论 #25424241 未加载
vittore超过 4 年前
Are there any means inside IG&#x2F;FB to let engineers (or employees in general) hold company&#x2F;managers accountable in cases like this?
rg2004超过 4 年前
Is it legal to start an auction to sell an exploit, never close on it, then use that as the price point to negotiate a bounty?