TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Ethics of Posting Exploits on Public Forums

3 点作者 pyeri7 个月前
I was going through a very popular programming forum today where some author had posted this article titled:<p>&gt; POC of &lt;Vulnerability Description&gt; CVE-XXXX-XXXX<p>I think this is ethically problematic because while it informs the users of this critical vulnerability in the software product and also advices them to update it, at the same time it also gives the attackers a readymade recipe to exploit this vulnerability. Now, an argument could be made that the attacker themselves may look up the openly published CVE and figure it out on their own, but that&#x27;s quite different from handing them the master key like this.<p>In fact, looking at this from a slightly cynical perspective, the author of this piece could be seen as actually egging or inviting trouble to the said product from potential hackers?

3 条评论

sciarook7 个月前
I think you&#x27;re misunderstanding how these things work. People who post POCs for vulnerabilities aren&#x27;t trying to invite hackers or cause trouble. They&#x27;re helping developers and security researchers understand exactly what the issue is and how to fix it. Without this information companies take way longer to patch the problem.<p>&gt; at the same time it also gives the attackers a readymade recipe to exploit this vulnerability. Now, an argument could be made that the attacker themselves may look up the openly published CVE and figure it out on their own, but that&#x27;s quite different from handing them the master key like this.<p>You answered yourself here :) Attackers who want to exploit vulnerabilities will figure it out on their own if they have to. Once a vulnerability is public, it&#x27;s public. The bad guys already have their tools and methods to reverse-engineer the flaws.<p>&gt; In fact, looking at this from a slightly cynical perspective, the author of this piece could be seen as actually egging or inviting trouble to the said product from potential hackers?<p>Hackers aren&#x27;t waiting around for someone to give them an easy way in, they&#x27;re already constantly looking for these kinds of flaws. The author of the POC is just putting this information out there to help everyone, especially the people who need to patch and secure their systems. I don&#x27;t see how the benefits of hiding this info and keeping us in the dark outweigh the benefits of publishing it.<p>Placing blame on the authors of POCs is strange. A larger issue is companies that either make shit soft&#x2F;hardware, or who don&#x27;t patch their systems in good time after a vulnerability is discovered.
cardz7 个月前
I have seen many companies getting hacked through vulnerabilities that had recently released exploits, while I was working with an incident response team. I believe in most case the CVE was available for some time before the exploit code was made public but no one was aware of the CVE and its implications so they didn&#x27;t apply the patches. I don&#x27;t think the researcher is inviting trouble but once the exploit becomes public there is a greater chance of the vulnerability being actively exploited.<p>Shameless plug: I&#x27;ve been working on a project called <a href="https:&#x2F;&#x2F;hacktrack.info" rel="nofollow">https:&#x2F;&#x2F;hacktrack.info</a>, that lets the user track the software they use and get an email alert when new CVEs are released for their stack.
pvg7 个月前
It&#x27;s an ancient but mostly settled debate - some sixteen years of tptacek commentary (it was already ancient and mostly settled 16 years ago as well):<p><a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?dateRange=all&amp;page=0&amp;prefix=true&amp;query=by%3Atptacek%20responsible%20disclosure&amp;sort=byDate&amp;type=comment" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?dateRange=all&amp;page=0&amp;prefix=true&amp;que...</a>