SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
1
Vulnerability Reporting Program
on a Shoestring Budget
Insights from the creation and first year of APNIC’s VRP
MyNOG 9
19 Sept 2022
Jamie Gillespie, Internet Security Specialist, APNIC
About APNIC
• APNIC is the Regional Internet Registry (RIR) for the 56
economies that makes up the Asia Pacific region
– Distributes and manages IP address
– Not-for-profit, purposefully open and transparent
– Approx 120 staff, mostly in Brisbane Australia
– Multiple data centres in Australia and internationally
– IaaS hosting on AWS and GCP, multiple SaaS applications/vendors
– Not just web sites, but also VPN, SMTP, DNS, FTP, whois, RPKI
and even rsync
2
In the beginning…
• APNIC has an internal IT team
(actually two of them)
– Internal vulnerability scanning
– External penetration tests
• APNIC also has developers writing new applications
• APNIC CSIRT was created internally to formalise incident
response procedures, and overall information security work
3
Early vulnerability reports
• Without a proper security point of contact, security
researchers would email privacy@ or even hr@ addresses
• Occasional scam email would come in too
4
Conception of the VRP
• We should have a point of contact for security researchers
• But we’ll need to advertise it somehow
• We’ll also need to set some rules
• This sounds like a bug bounty program
• Hmmm… but we can’t pay out bounties like the big profit
driven companies can
• Would a bug bounty program without the bounties work?
5
Conception of the VRP
• The APNIC Vulnerability Reporting Program!
– aka Vulnerability Disclosure Program / VDP
• Reading many other program texts led to a draft VRP
• Circulated draft to IT teams for feedback and improvements
• Used an early template from disclose.io for Safe Harbor
– disclose.io now have entire VDP generators and templates
• Got the APNIC Legal Team involved to approve the wording
6
The VRP layout
• Background of APNIC
• Introduction of the VRP – “Bug Reporting”
• In Scope
• Out of Scope
• Report Details
• Safe Harbor
7
The VRP layout (1/5)
• Background of APNIC
– Who we are, what we do
• Introduction of the VRP – “Bug Reporting”
– “We value the hard work of the security research community, and
welcome responsible disclosure of any vulnerabilities in our products
and services.”
– Please use csirt [at] apnic.net
– “We aim to reply to all reports within 7 days, and to resolve reported
P1-P4 vulnerabilities within 90 days”
8
The VRP layout (2/5)
• In Scope
– *.apnic.net
– *.apnic.foundation
– *.isif.asia
– *.seedalliance.net
– *.apidt.org
9
The VRP layout (3/5)
• Out of Scope
– 3rd party sites such as Lets Encrypt, Okta, Cloudflare,
Zoom, or similar
• If you inadvertently find an issue with these sites while testing APNIC,
we’d like to hear about it. However, we cannot provide permission to
test these third parties.
– Destruction of data
– DoS/DDoS
– Social engineering
– Physical security controls
10
The VRP layout (4/5)
• Report Details
– Repeated the csirt email address
– “We would appreciate it if your report included the
following information”
• Your contact information, so we can follow up with questions
• A description of the issue and its nature
• Detailed steps that allow us to reproduce the issue
• A brief description of the security impact of the issue
– “As a not-for-profit, we can’t pay out major bounties, but we really
appreciate your help in safeguarding our systems.”
11
The VRP layout (5/5)
• Safe Harbor
– If you conduct vulnerability research that is in scope, and
– if you report your findings to us in a timely manner
– We will consider this authorised, and
– promise not to take legal action against you
12
Making the VRP accessible
• Generated and published a GPG key for encrypted email
• Creation of a security.txt file with the help of securitytxt.org
13
Who is on the receiving end of reports?
• The IT teams will receive reports in our ticketing system
– csirt@apnic.net already existed, but not publicly used
• The IT teams will manage upgrades of 3rd party software
• What about the code APNIC creates internally?
• THE DEVELOPERS!
– Oh hey, developers, we didn’t forget about you (honest)
– Can we inject security patching procedures into your development cycle?
– Can we impose time frames for confirming vulnerabilities, fixing
vulnerabilities, testing, and pushing into production?
14
A premature birth
• Just 5 days before the VRP web page is published, a
vulnerability report is sent to csirt@apnic.net
– Stored self-XSS (Cross Site Scripting) in a display name field
• Early test of our vulnerability report handling procedures
• Added a Thank You section to the VRP page, with our early
bird security researcher as the first entry.
15
Thanks Denny!
The (actual) birth of the APNIC VRP!
• VRP web page quietly went live on 28/07/2020
– https://www.apnic.net/community/security/apnic-vulnerability-reporting-program/
• APNIC Blog post on 03/08/2020
– https://blog.apnic.net/2020/08/03/apnic-launches-vulnerability-reporting-program/
16
A slow controlled start
17
Note: these numbers are based on first reports of unique validated security vulnerabilities
0
2
4
6
8
10
12
14
07/2020
08/2020
09/2020
10/2020
11/2020
12/2020
01/2021
02/2021
03/2021
04/2021
05/2021
06/2021
07/2021
08/2021
09/2021
10/2021
11/2021
12/2021
Number of Vulnerability Reports (monthly)
0
10
20
30
40
50
60
70
80
90
07/2020
08/2020
09/2020
10/2020
11/2020
12/2020
01/2021
02/2021
03/2021
04/2021
05/2021
06/2021
07/2021
08/2021
09/2021
10/2021
11/2021
12/2021
Number of Vulnerability Reports (monthly)
Number of Reports Cumulative Number of Reports
A slow controlled start
18
81
Types and severities of vulnerabilities
• 16 x Information Disclosure
• 10 x Reflected XSS
• 5 x Denial of Service
• 5 x Stored XSS
• 4 x Clickjacking
• 3 x P1 vulnerabilities
– SQL Injection
– Sensitive Information Disclosure
19
0
5
10
15
20
25
30
35
40
P1 P2 P3 P4 P5
Vulnerabilities by Severity
P1 Incident that went public
20
Types and severities of vulnerabilities
• 16 x Information Disclosure
• 10 x Reflected XSS
• 5 each of:
– Denial of Service
– Stored XSS
• 4 each of:
– Clickjacking
– CSRF
21
• 1 each of:
– Exposed admin panel
– Exposed Kibana instance
– Host header poisoning
– Insecure cookie setting
– Insecure Direct Object References
– Leaking info via referrer
– localhost DNS record can lead to XSS
– Missing HSTS
– Open redirect
– REST API exposed
– Subdomain takeover
– Unrestricted file upload
– Unsafe Cross-Origin Resource Sharing
– Weak password policy
• 3 each of:
– Bypass business logic
– Email flood - lack of rate limiting
– WP xmlrpc.php exposed
• 2 each of:
– Cached data access after logout
– Conject injection
– Cookie stealing
– Missing SPF
– No expire after pw change
– Sensitive information disclosure
– SQL injection
Who reported the vulnerabilities
• 45 security researchers sent in single reports
• 9 security researchers sent in two reports each
• 3 security researchers sent in three reports each
• 1 security researcher sent in four reports
• 1 security researcher sent in five reports
• Most multiple reports came in on the same day
– Half for the same service, half for different services
• We also received 33 duplicate reports
– Mostly relating to original reports received in the first 4 months
22
Note: these numbers are based on first reports of unique validated security vulnerabilities
Lessons learned
• VRPs / VDPs are useful to complement existing security tools
and practices
• Good communication with internal stakeholders is important
– Before, during, and after launch
• Standard operating procedures and response templates ensure
consistent handling of reports and reporters
• Bounties aren’t required to launch a VRP
• Management reporting gets harder with more reports and details
23
What’s happened since?
• At around the one year mark of operations, APNIC compared
the services of vulnerability coordination vendors
• HackerOne was selected to receive, validate, and triage
vulnerability reports for APNIC
– They also provide reporting and privately advertise to their researchers
• Triaged reports are sent to our IT team who then route the
report to the appropriate product development team
24
What’s happened since?
• The VRP web page has been updated to include the
HackerOne submission form, in preference to csirt@
• The Out of Scope list has been expanded
– “Working as intended” items such as FTP directory listing
– Rate limiting issues on non-authenticated endpoints
– Missing security flags on cookies that don’t relate to authentication
• The Thank You / Hall of Fame list has grown
• APNIC is more secure
25
Questions & Discussion
26

Más contenido relacionado

Similar a Vulnerability Reporting Program on a Shoestring Budget by Jamie Gillespie, APNIC

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureDevOps.com
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformityIlkka Rinne
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldAgile Testing Alliance
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...NETWAYS
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
 

Similar a Vulnerability Reporting Program on a Shoestring Budget by Jamie Gillespie, APNIC (20)

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE Conformity
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 

Más de MyNOG

Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10MyNOG
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023MyNOG
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksMyNOG
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersMyNOG
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network ControllerMyNOG
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformMyNOG
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalidsMyNOG
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXMyNOG
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in KubernetesMyNOG
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKIMyNOG
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmMyNOG
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEMyNOG
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...MyNOG
 
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveFUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveMyNOG
 
Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...MyNOG
 
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...MyNOG
 
MyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyNOG
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearMyNOG
 

Más de MyNOG (20)

Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New Frontiers
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalids
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in Kubernetes
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable Paradigm
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
 
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveFUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
 
Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...
 
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
 
MyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIX
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 

Último

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Último (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Vulnerability Reporting Program on a Shoestring Budget by Jamie Gillespie, APNIC

  • 1. 1 Vulnerability Reporting Program on a Shoestring Budget Insights from the creation and first year of APNIC’s VRP MyNOG 9 19 Sept 2022 Jamie Gillespie, Internet Security Specialist, APNIC
  • 2. About APNIC • APNIC is the Regional Internet Registry (RIR) for the 56 economies that makes up the Asia Pacific region – Distributes and manages IP address – Not-for-profit, purposefully open and transparent – Approx 120 staff, mostly in Brisbane Australia – Multiple data centres in Australia and internationally – IaaS hosting on AWS and GCP, multiple SaaS applications/vendors – Not just web sites, but also VPN, SMTP, DNS, FTP, whois, RPKI and even rsync 2
  • 3. In the beginning… • APNIC has an internal IT team (actually two of them) – Internal vulnerability scanning – External penetration tests • APNIC also has developers writing new applications • APNIC CSIRT was created internally to formalise incident response procedures, and overall information security work 3
  • 4. Early vulnerability reports • Without a proper security point of contact, security researchers would email privacy@ or even hr@ addresses • Occasional scam email would come in too 4
  • 5. Conception of the VRP • We should have a point of contact for security researchers • But we’ll need to advertise it somehow • We’ll also need to set some rules • This sounds like a bug bounty program • Hmmm… but we can’t pay out bounties like the big profit driven companies can • Would a bug bounty program without the bounties work? 5
  • 6. Conception of the VRP • The APNIC Vulnerability Reporting Program! – aka Vulnerability Disclosure Program / VDP • Reading many other program texts led to a draft VRP • Circulated draft to IT teams for feedback and improvements • Used an early template from disclose.io for Safe Harbor – disclose.io now have entire VDP generators and templates • Got the APNIC Legal Team involved to approve the wording 6
  • 7. The VRP layout • Background of APNIC • Introduction of the VRP – “Bug Reporting” • In Scope • Out of Scope • Report Details • Safe Harbor 7
  • 8. The VRP layout (1/5) • Background of APNIC – Who we are, what we do • Introduction of the VRP – “Bug Reporting” – “We value the hard work of the security research community, and welcome responsible disclosure of any vulnerabilities in our products and services.” – Please use csirt [at] apnic.net – “We aim to reply to all reports within 7 days, and to resolve reported P1-P4 vulnerabilities within 90 days” 8
  • 9. The VRP layout (2/5) • In Scope – *.apnic.net – *.apnic.foundation – *.isif.asia – *.seedalliance.net – *.apidt.org 9
  • 10. The VRP layout (3/5) • Out of Scope – 3rd party sites such as Lets Encrypt, Okta, Cloudflare, Zoom, or similar • If you inadvertently find an issue with these sites while testing APNIC, we’d like to hear about it. However, we cannot provide permission to test these third parties. – Destruction of data – DoS/DDoS – Social engineering – Physical security controls 10
  • 11. The VRP layout (4/5) • Report Details – Repeated the csirt email address – “We would appreciate it if your report included the following information” • Your contact information, so we can follow up with questions • A description of the issue and its nature • Detailed steps that allow us to reproduce the issue • A brief description of the security impact of the issue – “As a not-for-profit, we can’t pay out major bounties, but we really appreciate your help in safeguarding our systems.” 11
  • 12. The VRP layout (5/5) • Safe Harbor – If you conduct vulnerability research that is in scope, and – if you report your findings to us in a timely manner – We will consider this authorised, and – promise not to take legal action against you 12
  • 13. Making the VRP accessible • Generated and published a GPG key for encrypted email • Creation of a security.txt file with the help of securitytxt.org 13
  • 14. Who is on the receiving end of reports? • The IT teams will receive reports in our ticketing system – csirt@apnic.net already existed, but not publicly used • The IT teams will manage upgrades of 3rd party software • What about the code APNIC creates internally? • THE DEVELOPERS! – Oh hey, developers, we didn’t forget about you (honest) – Can we inject security patching procedures into your development cycle? – Can we impose time frames for confirming vulnerabilities, fixing vulnerabilities, testing, and pushing into production? 14
  • 15. A premature birth • Just 5 days before the VRP web page is published, a vulnerability report is sent to csirt@apnic.net – Stored self-XSS (Cross Site Scripting) in a display name field • Early test of our vulnerability report handling procedures • Added a Thank You section to the VRP page, with our early bird security researcher as the first entry. 15 Thanks Denny!
  • 16. The (actual) birth of the APNIC VRP! • VRP web page quietly went live on 28/07/2020 – https://www.apnic.net/community/security/apnic-vulnerability-reporting-program/ • APNIC Blog post on 03/08/2020 – https://blog.apnic.net/2020/08/03/apnic-launches-vulnerability-reporting-program/ 16
  • 17. A slow controlled start 17 Note: these numbers are based on first reports of unique validated security vulnerabilities 0 2 4 6 8 10 12 14 07/2020 08/2020 09/2020 10/2020 11/2020 12/2020 01/2021 02/2021 03/2021 04/2021 05/2021 06/2021 07/2021 08/2021 09/2021 10/2021 11/2021 12/2021 Number of Vulnerability Reports (monthly)
  • 19. Types and severities of vulnerabilities • 16 x Information Disclosure • 10 x Reflected XSS • 5 x Denial of Service • 5 x Stored XSS • 4 x Clickjacking • 3 x P1 vulnerabilities – SQL Injection – Sensitive Information Disclosure 19 0 5 10 15 20 25 30 35 40 P1 P2 P3 P4 P5 Vulnerabilities by Severity
  • 20. P1 Incident that went public 20
  • 21. Types and severities of vulnerabilities • 16 x Information Disclosure • 10 x Reflected XSS • 5 each of: – Denial of Service – Stored XSS • 4 each of: – Clickjacking – CSRF 21 • 1 each of: – Exposed admin panel – Exposed Kibana instance – Host header poisoning – Insecure cookie setting – Insecure Direct Object References – Leaking info via referrer – localhost DNS record can lead to XSS – Missing HSTS – Open redirect – REST API exposed – Subdomain takeover – Unrestricted file upload – Unsafe Cross-Origin Resource Sharing – Weak password policy • 3 each of: – Bypass business logic – Email flood - lack of rate limiting – WP xmlrpc.php exposed • 2 each of: – Cached data access after logout – Conject injection – Cookie stealing – Missing SPF – No expire after pw change – Sensitive information disclosure – SQL injection
  • 22. Who reported the vulnerabilities • 45 security researchers sent in single reports • 9 security researchers sent in two reports each • 3 security researchers sent in three reports each • 1 security researcher sent in four reports • 1 security researcher sent in five reports • Most multiple reports came in on the same day – Half for the same service, half for different services • We also received 33 duplicate reports – Mostly relating to original reports received in the first 4 months 22 Note: these numbers are based on first reports of unique validated security vulnerabilities
  • 23. Lessons learned • VRPs / VDPs are useful to complement existing security tools and practices • Good communication with internal stakeholders is important – Before, during, and after launch • Standard operating procedures and response templates ensure consistent handling of reports and reporters • Bounties aren’t required to launch a VRP • Management reporting gets harder with more reports and details 23
  • 24. What’s happened since? • At around the one year mark of operations, APNIC compared the services of vulnerability coordination vendors • HackerOne was selected to receive, validate, and triage vulnerability reports for APNIC – They also provide reporting and privately advertise to their researchers • Triaged reports are sent to our IT team who then route the report to the appropriate product development team 24
  • 25. What’s happened since? • The VRP web page has been updated to include the HackerOne submission form, in preference to csirt@ • The Out of Scope list has been expanded – “Working as intended” items such as FTP directory listing – Rate limiting issues on non-authenticated endpoints – Missing security flags on cookies that don’t relate to authentication • The Thank You / Hall of Fame list has grown • APNIC is more secure 25