7 Steps to Avoid Uncoordinated Vulnerability Disclosure

19.02.2020

Imagine the following situation. You work as a security manager for a company that owns the website www.example.com. One day, your sales department receives an email from an unknown individual. The sales department forwards it to you. The email has the following content:

You example.com/login.php page break. Send XSS.

</script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror=’eval(src)’><img/	
src=`~` onerror=prompt(1)><form><iframe 	
src="javascript:alert(1)"
	;>

If no fix, I send to FD in month.

Here’s a list of steps that describes how you should react to such a message to avoid public uncoordinated vulnerability disclosure.

Step 1. Assess and Fix Your Attitude

First of all, realize that you have not been hacked. If this were an attacker, the potential impact would be much greater. Your web page could have been used to attack somebody else or you might have a lawsuit from one of your customers because their sensitive information was released into the wild.

The person who contacted you is an independent security researcher. They find security issues and report them in good faith, making money from bug bounties.

Do’s:

Don’ts:

Step 2. Communicate Efficiently

To avoid public disclosure of your security vulnerabilities, make sure that the hacker is kept up to date on the bug. They want it fixed as soon as possible because other parties might be endangered. For example, a Cross-site Scripting (XSS) vulnerability in your web application may be used to attack other people using your domain name to build false trust via social engineering.

Do’s:

Don’ts:

Step 3. Confirm the Vulnerability

You should confirm the reported vulnerability and learn more about it. This will make the bug easier to fix.

Do’s:

Don’ts:

Step 4. Remediate Promptly

Even if the reported vulnerability is not very dangerous, you should treat it with priority because it has been reported by an external source.

Do’s:

Don’ts:

Step 5. Remunerate the Hacker

Even if you do not have a bounty program, you should appreciate the help from the hacker. Their report saved you from a potentially damaging situation. The bug might have been the target of active exploitation causing a data breach or reputation loss.

Do’s:

Don’ts:

Step 6. Disclose the Vulnerability

Once the vulnerability is fixed, you should admit to it, for two reasons. First of all, it might have been silently exploited by a black-hat hacker and you don’t want to find information about it in third-party sources earlier. Second of all, a public report from you will have a very positive impact on how your company is perceived by the security industry. For example, see what Cloudflare did when they encountered a major problem.

Do’s:

Don’ts:

Step 7. Build a Vulnerability Disclosure Policy

Learn from this experience. A lot of steps above probably had to be done ad-hoc and you should be prepared for similar situations for the future. The best way to do it is to create your own vulnerability disclosure program and a bug bounty program.

While a lot of companies don’t have such programs, the biggest players in the world such as Google are well-prepared. Follow in their footsteps.

Do’s:

Don’ts:

Resource:- https://www.acunetix.com/blog/web-security-zone/7-steps-avoid-uncoordinated-vulnerability-disclosure/

Liitu uudiskirjaga