TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Advice sought regarding HackerOne and vulnerability submission

3 点作者 Max-Ganz-II10 个月前
I would like advice regarding HackerOne.<p>I am an Amazon Redshift specialist.<p>I know of an issue with Redshift such that any user who can create a table and issue a query on that table is able, with normal but specially crafted table and query, to crash the cluster about ten seconds after the query is issued.<p>I reported this to HackerOne as a vulnerability, providing the DDL for the table and the SQL for the query.<p>HackerOne triage (not AWS) have come back with;<p>&gt; We are happy to review this further if you are able to leverage this into a practical exploitation scenario that results in an impact to Amazon assets or data. [Your] report will be closed as Informative.<p>Which is not what I expected.<p>I am thinking I have misunderstood something fundamental.<p>Can anyone here with experience or knowledge in this matter provide advice?

2 条评论

anonym2910 个月前
I&#x27;d double check whether a denial of service is out of scope, it often is.<p>Additionally, I&#x27;m not intimately familiar with Redshift, but being able to create a table suggests the attacker would already need a fairly high privilege level to begin with, no? If there are other ways to invoke denial of service conditions from that existing privilege level, this finding may be somewhat moot out of redundancy, similar to how a submission for &quot;a root user with the ability to execute arbitrary commands can cause a denial of service condition in XYZ&quot; would be moot - XYZ is not needed for an adversary with those perms to cause a DoS.
评论 #41086597 未加载
codingdave10 个月前
People with access to change systems have access to crash systems. This is fairly true across all tech, and all you did was prove it for Redshift. I think what you are missing is that for it to be a vulnerability, it would need to be something that extends that ability to do damage beyond your current scope. If you can crash someone else&#x27;s cluster, that is a vulnerability. But not if you can only crash your own.
评论 #41086623 未加载