top | item 8564574

(no title)

xnull | 11 years ago

Oh we're not talking trivial bugs or single-site XSS.

Disappointed that 'mediocre' vulns got interpreted in this thread as 'trivial'.

Mediocre doesn't mean trivial, extremely scoped or useless. Mediocre means that it is for sensitive but not widely deployed software, for widely deployed software on default config but is post-auth or is not reliable, or it is reliable and yiels high auth but requires pairing with another vulns (i.e. memory disclosure) or extended recon (revision number, etc).

A MySQL bug affecting recent revisions that causes arbitrary file overwrites with semi-controlled content but that requires unprivileged (guest) auth would meet this criteria.

Apologies for the confusion with the word 'mediocre' - I figured people here would know.

In general organizations in the offensive world will pay more than those in the defensive world. This is not a hard and fast rule, but mostly it is the case that offensive network operations stand to gain more from the use of 0days than vendors stand to lose by not paying for the disclosure to patch them. It's not really a good calculus to use data from vendors sales to calculate the other.

discuss

order

tptacek|11 years ago

A post-auth MySQL bug sold for five figures?! Why? How does anyone make money with that bug?

xnull2guest|11 years ago

It's worth five figures to the buyer if they can make five figures or more of value from it.

Not speculating about nation states here but 'groups': making good money from post-Auth MySql RCE not totally absurd - Amazon, Rackspace, HP, Heroku and Jelastic all offer MySql-as-a-service, where you are given low privilege (maintained, geo-redundant, etc) account access to shared MySql instance. If there's more than five digits of business value stored in that database then a five digit exploit makes sense.

Or think about any of the (poorly written) bitcoin services out there that use some default phpAdmin creds for a database that also hosts their vault.