I still think $5,000 is ridiculously low. Lots of research like this fails and it happens you do the work just to be told someone already filled a similar bug before.
Pretty elaborate research indeed, I once filed a very simple, but just as dangerous, stored XSS on www.linkedin.com (with access to cookies) + some other bug, hoping to speedup my Partner API Request, got $400 for the XSS and many weeks later $400 for the other bug too (which took them 6+ months to fix). The $/time wasn't worth it, and of course the Partner API Request got declined without explanation.
It seems to be the market clearing price. Lots of companies think "hey, we offer peanuts and people do all this expensive work for us."
This guy did it to land a job. Hopefully he's done with spec-work like this and his new employer makes sure to negotiate rates ahead of time for security reviews.
@mar1, I've forwarded your interest in finding a job to our security recruiting lead. We don't have a relevant office in the desired location, but happy to discuss. Feel free to reach out, my email is [email protected].
Well done and well explained.
Great thing to share your thoughts in open-source as well.
I wish you the best with your job research, companies like Advance or Octo would be great places for you in France, based on the skills you showed.
A lot of vulnerabilities like this are found with fuzzing. Same with poor encryption schemes. Depends what your definition of clever is but normally fuzzing is an intermediate research step to just see what response you get as you change input to ascertain information of what's going on behind the scenes so you can use a more directed attack later.
[+] [-] hartator|9 years ago|reply
[+] [-] bwblabs|9 years ago|reply
[+] [-] danielweber|9 years ago|reply
This guy did it to land a job. Hopefully he's done with spec-work like this and his new employer makes sure to negotiate rates ahead of time for security reviews.
[+] [-] pg_is_a_butt|9 years ago|reply
[deleted]
[+] [-] hgears|9 years ago|reply
[+] [-] scriptsmith|9 years ago|reply
[+] [-] n13|9 years ago|reply
[+] [-] timdierks|9 years ago|reply
[+] [-] mpeg|9 years ago|reply
We should connect, my company doesn't have anyone fully remote right now but maybe we could do in the near future...
[+] [-] zippy786|9 years ago|reply
https://www.google.com/about/appsecurity/reward-program/inde...
How come accounts.google.com more severe than others for XSS ?
[+] [-] jonknee|9 years ago|reply
Because that's where the jewels are: "Control, protect, and secure your account, all in one place"
[+] [-] nicoboo|9 years ago|reply
[+] [-] z3t4|9 years ago|reply
[+] [-] lindgrenj6|9 years ago|reply
[+] [-] hamilyon2|9 years ago|reply
[+] [-] CorvusCrypto|9 years ago|reply
[+] [-] otterley|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]