Wednesday, November 29
TOP STORY
I am Root. This tweet by @lemiorhan went viral, though the issue was reported on an Apple Forum some time ago (as Lemi himself admits). Apple published step-by-step instructions to help customers.
HACKTIVITY
Remote Code Execution at http://tw.corp.ubnt.com [20 upvotes] - $5,000 bounty for this report to Ubiquiti Networks by @hassham.
Subdomain Takeover [4 upvotes] - no bounty for this report to TTS Bug Bounty by @picklepwns. The bug was not in scope for the 18F Vulnerability Disclosure Policy and (rightly so) not eligible for a bounty, however the team was quick, responsive, courteous and professional throughout and I highly recommend this program.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
PSA: Public AWS buckets are Public. Latest reminder: Army’s Red Disk Intel sharing was left open
Cobalt malware using 17-year old vuln
That OSS-fuzz life
Expensify: That’s not a bug, that’s a feature
That ship won’t sail: Ken Munro from Pen Test Partners shows the potential for message manipulation with BAPLIE.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
Although the vulnerability has existed for 17 years, according to a report by SecurityWeek, it was only disclosed and patched by Microsoft in the second week of this month.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.