heiglandreas,
@heiglandreas@phpc.social avatar

Starting the day with answering emails from "security researchers" ...

shochdoerfer,
@shochdoerfer@phpc.social avatar

@heiglandreas ignore them, that's the best you can do. Keep getting this s**t for a few months now. Not funny. At least the last person asked before if they get a reward for reporting an incident...

heiglandreas,
@heiglandreas@phpc.social avatar

@shochdoerfer We actually got some (1%?) really good feedback and solved some issues. But most of it is really just crap...

shochdoerfer,
@shochdoerfer@phpc.social avatar

@heiglandreas the only thing they reported to us was CORS problems and stuff.

heiglandreas,
@heiglandreas@phpc.social avatar

@shochdoerfer Yeah. That's the "low hanging fruit" that only works in BurpSuite...

shochdoerfer,
@shochdoerfer@phpc.social avatar

@heiglandreas I am fine with getting reports like this.

The annoying part is dealing with this bug bounty approach because, obviously, the reports want some money for their effort.

heiglandreas,
@heiglandreas@phpc.social avatar

@shochdoerfer If it'S useless, they get a nice "thank you but no thanks"

Some then insist whether their valuable insight doesn't vouch for a reward. I usually ignore those then...

Otherwise I'D have to invoice them for my time...

dasniko,
@dasniko@mastodon.cloud avatar

@heiglandreas You mean something like "...your ' 'sessionid' cookie is insecure..."!?

heiglandreas,
@heiglandreas@phpc.social avatar

@dasniko You are storing passwords in plain text because I can see them in the request when I intercept them with BurpSuite...

dasniko,
@dasniko@mastodon.cloud avatar

@heiglandreas aaawwwwhhh, also a nice one! 😮‍💨

dasniko,
@dasniko@mastodon.cloud avatar

@heiglandreas Und gerade in einer Mailingliste... "In our current setup(Monolithic), we hash passwords (SHA256) on the frontend (ensuring they do not appear in plain text in the network tab, as per our security audit report) before passing them to the controller side for login."

heiglandreas,
@heiglandreas@phpc.social avatar

@dasniko So they are now storing the hash of the hash in the DB? So the hash has now become the password?

🤦‍♂️

Extra security would have been encrypting the password with a public key and then decrypt it on the server side with the private key...

🤔

Hm....

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • PowerRangers
  • DreamBathrooms
  • everett
  • magazineikmin
  • InstantRegret
  • ngwrru68w68
  • Youngstown
  • Durango
  • slotface
  • rosin
  • GTA5RPClips
  • tester
  • kavyap
  • thenastyranch
  • provamag3
  • mdbf
  • osvaldo12
  • ethstaker
  • vwfavf
  • cubers
  • normalnudes
  • tacticalgear
  • khanakhh
  • cisconetworking
  • modclub
  • Leos
  • anitta
  • megavids
  • All magazines