hi, i’m daniel. i’m a 15-year-old with some programming experience and i do a little bug hunting in my free time. here’s the insane story of how I found a single bug that affected over half of all Fortune 500 companies:

  • lud@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    ·
    4 hours ago

    Zendesk commented on the GitHub post with this:

    Daniel points this out at the end of his post but for those looking for more details on this bug submission, our team at Zendesk posted some info here.

  • where_am_i@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 hours ago

    Is it you, lemmy, brigading that GitHub gist? @ZendeskTeam is being is already dead, but don’t worry, you can still come and give them another kick.

  • Lvxferre@mander.xyz
    link
    fedilink
    English
    arrow-up
    38
    ·
    11 hours ago

    What a corporation of muppets! First dismissing the report as “not our problem lol”, then as the hunter contacts affected companies the bug “magically” becomes relevant: they reopen the report, and then boss him around to not disclose it with the affected parties.

    I bet that they lost way, way more than the US$2000 that they would’ve paid to the bug hunter. Also, I’m happy that hackermondev got many times that value from the affected companies.

  • troed@fedia.io
    link
    fedilink
    arrow-up
    63
    ·
    14 hours ago

    Despite fixing the issue, Zendesk ultimately chose not to award a bounty for my report. Their reasoning? I had broken HackerOne’s disclosure guidelines by sharing the vulnerability with affected companies

    Regardless of everything else they should be kicked out from HackerOne since it’s clearly Zendesk not being truthful here.

    • JordanZ@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      edit-2
      4 hours ago

      They posted a link to their blog post down in the comments of the gist…

      We also want to address the Bug Bounty program associated with this case. Although the researcher did initially submit the vulnerability through our established process, they violated key ethical principles by directly contacting third parties about their report prior to remediation. This was in violation of bug bounty terms of service, which are industry standard and intended to protect the white hat community while also supporting responsible disclosure. This breach of trust resulted in the forfeiture of their reward, as we maintain strict standards for responsible disclosure.

      They failed to mention that the report was closed for being out of scope. Any reasonable person would expect that to mean a remediation was not coming. So really he didn’t give up his bounty because he wasn’t getting one to begin with.

      Edit: cause autocorrect is dumb.

    • elvith@feddit.org
      link
      fedilink
      English
      arrow-up
      26
      ·
      10 hours ago

      I couldn’t help but find it amusing—they were now asking me to keep the report confidential, despite having initially dismissed it as out of scope.

      “Sorry, but per your own guidelines this is out of scope. Because of this, this bug is not part of the agreement and guidelines on Hackerone. You can find my full disclosure, that I wrote after your dismissal here: <Link>” /s

      • bjornsno@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        I mean, that still allows zendesk to reply with “oh yeah that’s also why we’re not paying the bounty”

        • elvith@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 minutes ago

          Well, they did it anyways, so…

          Also this might work as an answer to “yeah, it’s a bug, but we won’t pay you”

  • AmbiguousProps@lemmy.today
    link
    fedilink
    English
    arrow-up
    65
    ·
    14 hours ago

    The best part of this is how Zendesk’s blog post claims that Zendesk discovered the issue, and then blamed the 15 year old for not following ethical principles.

    • kalkulat@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      49
      ·
      14 hours ago

      I specially liked the part where he collected $50k by clueing the affected companies.

    • Dave@lemmy.nz
      link
      fedilink
      English
      arrow-up
      36
      ·
      edit-2
      11 hours ago

      They aren’t trying to actually send from that email, they are trying to create an Apple ID that lets them log in using that email effectively as a username. And Slack will add people to the internal Slack if the email is a company email address.

      To open that account, they need to prove to Apple they own the account. They sign up with Apple and say their email address is support@company.com, then Apple sends them a code to verify it’s their email.

      They can’t actually receive the verification email, because it’s not their email. That’s where the exploit comes in. It’s very important that this email address is the one that forwards emails to Zendesk. The verification email from Apple goes to Zendesk, then they use the exploit to see the history of the zendesk ticket, which includes the verification code.

  • Moonrise2473
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    14
    ·
    14 hours ago

    Trying to do the devil’s advocate: Zendesk isn’t a mail server and all it’s doing is to organize a million messages sent to a specific address in a neater way. A spam filter is also present because every email client needs it, but spoofed mails should be rejected by the mail server, not the clients.

    • Lvxferre@mander.xyz
      link
      fedilink
      English
      arrow-up
      18
      ·
      edit-2
      11 hours ago

      What “should be done” is irrelevant - what matters is what “is done”. And plenty servers don’t enforce SPF, DKIM and DMARC. (In fact not even Google and Yahoo did it, before February of this year.)

      And, when you know that your product has a flaw caused by a third party not doing the right thing, and you can reasonably solve it through your craft, not solving it is being irresponsible. Doubly true if it the flaw is related to security, as in this case.

      Let us learn with Nanni: when Ea-nāṣir sold him shitty copper, instead of producing shitty armour, weapons and tools that might endanger Nanni’s customers, Nanni complained with Ea-nāṣir. Nanni is responsible, Zendesk isn’t. [Sorry, I couldn’t resist.]

    • Dave@lemmy.nz
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      11 hours ago

      Sorry you’ve been downvoted for trying to start a discussion.

      Is this not the swiss cheese thing? No control is perfect, so you layer them. If there is no reason why Zendesk should let this happen, then it shouldn’t happen.

      • Moonrise2473
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        2
        ·
        10 hours ago

        They absolutely can and should fix it, but in the end, IMHO, it’s a mail server misconfiguration coupled with a slack issue, not a Zendesk security issue

        • Dave@lemmy.nz
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          10 hours ago

          I can see both angles of this. Especially since the original disclosure didn’t have the full detail of how it could be exploited to access company systems, and they (the writeup author) never disclosed that update.

          You can see how a large company (Zendesk) could miss this in the multitude of people trying to claim bug bounties. I fully believe that had they understood the issue they should have fixed it, since it’s within their power and basically a service to their clients. But I can understand how the limited detail in the original disclosure demonstrated a much lower level risk than the end exploit that was never reported.

          • davidagain@lemmy.world
            link
            fedilink
            English
            arrow-up
            11
            ·
            9 hours ago

            Nah, zendesk should absolutely have recognised that gaining unauthorised read access to support ticket email chains is a massive security issue. Firstly “support email chains” accounts for proportionately nearly all the data zendesk is handling, so a vulnerability there is core to the product, not at all peripheral, and secondly, who on earth is working in tech today that doesn’t know that your email is they key to all your online accounts?

            Zendesk here were blatantly either stupid or in denial and treated a bug reporter as a low life enemy instead of an asset. The kid did right by any plausible moral viewpoint.