Hacking, AppSec, and Bug Bounty newsletter
2017-11-29 | I am Root, BAPLIE manipulation, and Cobalt malware
Wednesday, November 29
Remote Code Execution at http://tw.corp.ubnt.com [20 upvotes] - $5,000 bounty for this report to Ubiquiti Networks by @hassham.
Subdomain Takeover [4 upvotes] - no bounty for this report to TTS Bug Bounty by @picklepwns. The bug was not in scope for the 18F Vulnerability Disclosure Policy and (rightly so) not eligible for a bounty, however the team was quick, responsive, courteous and professional throughout and I highly recommend this program.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
PSA: Public AWS buckets are Public. Latest reminder: Army’s Red Disk Intel sharing was left open
Cobalt malware using 17-year old vuln
That OSS-fuzz life
Expensify: That’s not a bug, that’s a feature
That ship won’t sail: Ken Munro from Pen Test Partners shows the potential for message manipulation with BAPLIE.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
Although the vulnerability has existed for 17 years, according to a report by SecurityWeek, it was only disclosed and patched by Microsoft in the second week of this month.