Engineer nets Facebook's biggest bug bounty, but not the jackpot he hoped for

Reginaldo Silva was awarded $33,500, but had quietly hoped for more

Reginaldo Silva, a computer engineer in Brazil, found a serious problem in Facebook's website, but the company isn't revealing how much it paid him.

Reginaldo Silva, a computer engineer in Brazil, found a serious problem in Facebook's website, but the company isn't revealing how much it paid him.

Last November Reginaldo Silva, a computer engineer in Brazil, found one of the worst kinds of vulnerabilities in Facebook's software. It has netted him the biggest bug bounty the social network has ever paid out, but while he's not complaining, it wasn't quite the windfall he hoped for.

The bug related to code used for OpenID, an authentication system that lets people use the same login credentials for multiple online services.

Silva found that the vulnerability could be executed from a remote computer, one of the most dangerous types of software flaws. It could have allowed a hacker to read almost any file and open arbitrary network connections on a Facebook server.

"I knew I had found the keys to the kingdom," Silva wrote on his blog.

Facebook didn't reveal in its own blog post Wednesday how much it paid him for finding the bug, saying only that it was the company's "biggest bug bounty payout ever." But with Silva's permission, a Facebook spokesman later revealed that the amount was $33,500.

Silva gently noted in his blog something that Facebook's director for Security Incident Response reportedly said in July 2012. Bloomberg quoted the director, Ryan McGeehan, as saying, "If there's a million-dollar bug, we will pay it out."

That got Silva's hopes up, especially after Facebook told him his payout would be raised since the bug he found was a remotely executable one.

"I won't disclose the amount, but if you have any comments about how much you think this should be worth, please share them," Silva wrote in his blog post. "Unfortunately, I didn't get even close to the $1 million dollar payout cited above."

Facebook has concluded that no one exploited the flaw. A thriving underground market exists for such information, though it's difficult to put a price on it. If millions of Facebook users' data had been compromised, the backlash could have been costly and hurt the social network's reputation.

Silva notified Facebook of the flaw on Nov. 19. The social networking site said Wednesday it had alerted on-call employees and pushed out a short-term fix in just three and a half hours.

Facebook pays a minimum of $500 for a vulnerability that qualifies under its terms and conditions. There is no maximum reward, it says in its information about bug bounties: "each bug is awarded a bounty based on its severity and creativity."

The bug, which Silva found in September 2012, wasn't unique to Facebook; he found it had affected other web services, including two Google services: App Engine and Blogger. After alerting Google to the issues, he decided to see if Facebook was affected too.

Silva wrote there are many servers on the Internet that are still vulnerable, which is why he didn't publish proof-of-concept code that would show how the flaw could be abused.

Google awarded him $500 for pointing out the issue, Silva wrote. He posted the technical details in his write-up.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags securitydata breachExploits / vulnerabilitiesdata protectionFacebook

More about BloombergFacebookGoogle

1 Comment

Sidney

1

Make sure there is no gap between your motor bike pants and the bottom edge of your jacket. Before you report it, call home and verify what you believe is missing. For those who plan on traveling very light, shoulder bags and backpacks are available.

Comments are now closed

Amazon vs. Google vs. Windows Azure: Cloud computing speed showdown

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]