by detectify on 4/11/14, 9:23 AM with 192 comments
by mixmax on 4/11/14, 10:18 AM
This is an examplary response from google. They respond promptly (with humor no less) and thank the guys that found the bug. Then they proceeded to pay out a bounty of $10.000.
Well done google.
by msantos on 4/11/14, 11:06 AM
So anyone can create a trap link such as
<a href="file:///etc/passwd">gold</a>
Or <a href="trap.html">trap</a>
once trap.html is requested the server issues a header "Location: file:///etc/passwd"Then it's just a matter of seat and wait for the result to show up wherever that spider shows its indexed results.
by numair on 4/11/14, 9:45 AM
This should scare anyone who has ever left an old side project running; I could see a lot of companies doing a product/service portfolio review based on this as a case study.
by halflings on 4/11/14, 1:32 PM
They also discovered vulnerabilities in many big websites (dropbox, facebook, mega, ...). Their blog also has many great write-ups : http://blog.detectify.com/
by raverbashing on 4/11/14, 11:46 AM
It's too much hidden power in the hands of those who don't know what they're doing (loading external entities pointed in an XML automatically? what kind of joke is that?)
by chmars on 4/11/14, 2:03 PM
The pricing models has apparently worked so far. Are any active users of Detectify here and can share their experience?
by raesene3 on 4/11/14, 9:58 AM
Reading the spec. which led to the implementations, can often reveal interesting things, like support for external entities..
by cheald on 4/11/14, 9:55 AM
by njharman on 4/11/14, 2:51 PM
Input from potentially malicious users should be in the simplest, least powerful of formats. No logic, no programability, strictly data.
I'm putting "using XML for user input" in same bucket as "rolling your own crypto/security system". That is you're gonna do it wrong, so don't do it.
by NicoJuicy on 4/11/14, 10:31 AM
Actually digged it when i read it a few years ago and awesome knowing that it was probably used for this reply :)
by NicoJuicy on 4/11/14, 9:48 AM
by enscr on 4/11/14, 10:31 AM
by plq on 4/11/14, 1:11 PM
by dantiberian on 4/11/14, 10:58 AM
by mwcampbell on 4/13/14, 1:55 AM
root:x:0:0:root:/:/bin/sh
bin:x:1:1:bin:/dev/null:/sbin/nologin
nobody:x:99:99:nobody:/dev/null:/sbin/nologin
app:x:100:100:app:/app:/bin/sh
by kirab on 4/11/14, 2:39 PM
by yummybear on 4/11/14, 5:25 PM
by peterkelly on 4/11/14, 1:28 PM
by antocv on 4/11/14, 10:16 AM
Getting the source?
by ajsharp on 4/11/14, 6:01 PM
by h1ccup on 4/11/14, 10:33 AM
by pearjuice on 4/11/14, 7:12 PM
"Sir, I am sorry to inform you that another backdoor has been found. We will introduce two more as agreed upon in our service level agreement."
by sebban_ on 4/11/14, 2:36 PM
by blueskin_ on 4/11/14, 12:17 PM
by 4ad on 4/11/14, 10:47 AM
This sells for at least 10 times more on the black market. Why would one rationally chose to "sell" this to google instead of the black market.
Some people don't break the law because they are afraid to get caught, but I like to believe that most people don't break the law because of the moral aspect. To me at least, selling this on the black market poses no moral questions, so, leaving aside "I'm afraid to get caught", why would one not sell this on the black market? Simple economic analysis.
Very serious question.