Bitcoin Forum

Economy => Marketplace => Topic started by: mrb on January 30, 2011, 07:36:24 AM



Title: .
Post by: mrb on January 30, 2011, 07:36:24 AM
.


Title: Re: XSS vulnerability on facebook.com 10000 BTC
Post by: Nefario on January 30, 2011, 08:59:35 AM
If anyone goes for this use clearcoin.


Title: Re: XSS vulnerability on facebook.com 10000 BTC
Post by: genjix on January 30, 2011, 10:01:41 AM
you could get a lot more for this 0-day vulnerability. you should find a trusted forum member, pay them 30 btc to verify it's real and then put it up in an auction.


Title: Re: XSS vulnerability on facebook.com 10000 BTC
Post by: dingus on February 07, 2011, 04:46:39 AM

You will get exclusivity.
It is not known by anyone else.
It is the result of 30+ hours of research.
It has never been "used" other than in my tests.
It was discovered months ago and is still working.


http://blog.cartercole.com/2010/06/social-engineering-crazy-encoding.html

Is this what you speak of?


Title: Re: .
Post by: moncojhr on February 09, 2011, 06:14:03 AM
Quote
>XSS vulnerability on facebook.com 10000 BTC
Warning: topic may be controversial. I am a security researcher. I found a cross-site scripting vulnerability on facebook.com which I decided to sell for 10k BTC.

You will get exclusivity.
It is not known by anyone else.
It is the result of 30+ hours of research.
It has never been "used" other than in my tests.
It was discovered months ago and is still working.

Technical details
Entice a user authenticated to Facebook to browse a specially crafted link "http://...facebook.com/...". My non-persistent XSS will allow you to execute arbitrary javascript code under her identity, read/modify her profile, etc.

My goals
Raise awareness that even high-profile sites are rarely secure. And perhaps push Facebook a little bit toward accepting the idea that buying vulnerabilities from security researchers would be good for them and the Internet community. Just like Google buys vulnerabilities from researchers, which has tremendously helped secure their online apps in the last few months.

Excellent google cache got it :-)

From his discription it doesnt sound like what is explained in that blog post... He said its a "non-persistent XSS" , enticing a user to run javascript in their browser is not XSS.


Title: Re: .
Post by: talkinrock on February 09, 2011, 09:10:23 PM
EDITED by talkinrock


Title: Re: .
Post by: dingus on February 09, 2011, 09:15:18 PM
Ummm....   Why did mrb all of a sudden delete the thread title and the original post?!!

Does anyone find that a bit suspicious and/or odd?    ???

Doesn't matter as he was quoted saying the original text anyway.


Title: Re: .
Post by: lumos on February 09, 2011, 09:50:28 PM
security maybe? maybe you should remove your quote as a show of good faith.


Title: Re: .
Post by: ribuck on February 09, 2011, 09:58:00 PM
Maybe he sold the vulnerability to someone else, and wants to cover his tracks.


Title: Re: .
Post by: Veltas on February 10, 2011, 01:12:08 AM
Maybe he sold the vulnerability to someone else, and wants to cover his tracks.
Good luck with that...

This must be interesting to people who use Facebook or any 'social' website.  I don't use Facebook or the such.