lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=zpr+tM3s0LmdE257tiJtHEWucCfJUOi-3K=0m@mail.gmail.com>
Date: Sat, 19 Feb 2011 12:54:49 -0500
From: Hack Talk <hacktalkblog@...il.com>
To: Eyeballing Weev <eyeballing.weev@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: University of Central Florida Multiple LFI

Weev,

I actually know many of the "techrangers" who are UCF employed students
which are in charge of maintaining websites and have spoken to them
personally about these and other vulnerabilities many times in the past and
they have yet to patch them. In addition to that I have gone so far as to
finding one of the developer's website (http://www.stevenmonetti.com/) and
not only emailing him, but adding him to my gTalk list (the invitation to
which he has yet to accept after about a month) and after looking at his
resume left him a text message and a voicemail all with no contact back. I
am flat out when reporting vulnerabilities and let the affected party know
from day one that I follow the RFP Responsible Disclosure Policy and if I
don't hear back in 5 days I no longer need to work with them. On days 3 and
5 I always email back if they haven't gotten back in contact with me and
once again reiterate the disclosure policy. At this point they must not care
enough if I was doing that every 3 days for quite some time. If they don't
care about their own security then something must happen to make them care.


Luis Santana


On Sat, Feb 19, 2011 at 12:49 PM, Eyeballing Weev <eyeballing.weev@...il.com
> wrote:

> Shawn,
>
> "Hack Talk" would rather fire off 5 emails than pick up a phone, make a
> phone call and call someone from the WHOIS information since by his own
> admission he's a Florida resident who lives near UCF or maybe he's
> worried about law enforcement after all ;-)
>
>
> On 02/19/2011 12:46 PM, Hack Talk wrote:
> > Hey Shawn,
> >
> > I typically follow the Rain Forest Puppy Responsible Disclosure Policy
> > which I'm sure many people have read. I even extended the contact time
> > to 2 weeks since Universities are quite busy places. During those 2
> > weeks I personally emailed them back 5 times and did not get a single
> > response back. This is not the first time the University has neglected
> > to respond to vulnerabilities affecting their sites and as such I
> > decided that enough was enough and that by publicly disclosing these
> > vulnerabilities they would be forced to patch their code. I've worked
> > with many Universities in the past to patch there vulnerabilities and
> > they have responded typically within 12 hours of me sending my initial
> > email alerting them to the issue. Being a .edu does not exempt you from
> > hackers wanting into your system and it does not mean you can get away
> > with having gaping holes in security for months without patching them.
> >
> > Full Disclosure as a methodology is about forcing people to fix their
> > holes which is exactly what I was hoping would happen to UCF.
> >
> > Thanks for doing your best to extinguish the flamewar that was starting
> :D.
> >
> >
> > Luis Santana
> >
> >
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ