I don't know how legal it is, and I understand that the breach finder wants to publish his findings himself (for "reputations points" maybe ?), and he might lose this right by selling an info, but at least he's getting something out of this. IANAL, but i'm pretty sure you could get in trouble for publicly posting information on how to hack a public service (or pretty much anything for that matter)
Unless, as others suggested, you can legally make a profit out of it, then by all means! Otherwise, just let it go...
1) It can be difficult to know whether customers are (or could be) affected. Just because the author can't find the case doesn't mean someone else can't. 2) If the company refuses to fix this broken window, they may find other broken windows that aren't worth fixing, which may affect users. By releasing the vulnerability, one can force the company to become more conscious towards security in the long-term.
Because if that company is storing sensitive information belonging to others (emails, credit cards, etc), it would be irresponsible to not disclose it. Chances are someone else found out and has been actively exploiting that vulnerability.
Contrary to popular opinion on HN, finding vulnerabilities in software you yourself run on your own computer is rarely fraught. We hear about the exceptions in the news because they're exceptional. In reality, people publish vulnerabilities all the time.
The same thing obviously CANNOT BE SAID about finding vulnerabilities in other people's web applications. Finding web vulnerabilities without permission is highly fraught. You can easily find yourself both civilly and criminally liable for doing so.
1) Do nothing. 2) Fuck 'em. 3) Not my problem.
...is there a difference between discovering a new exploit and discovering a company is open to an old or well known exploit? This sounds like the latter.
I'm all for disclosure of a newly found exploit because by doing so you are informing every one who might have the problem and that allows them to take action, etc. But if this is just one business who refuse to fix a known problem then, well, that's their stupidity, no?
See, the bit that bothers me is that publishing the "news" that one company is vulnerable has to be a bit iffy. Its like publishing a list of buildings that don't have good door locks or something. We don't see that in the real world, so why would it be reasonable for the IT world? I mean, there is no legitimate list of vulnerable buildings created by white hat burglars, is there? Its never been legit for such burglars to gain access to a building and leave a note describing the poor security on the CEO's desk.
They might not be refusing to fix the problem. They might actually be unable with the tech talent they've got left.
My advice? Don't look like a nail.
The correct way would be: 1) discover a vulnerability 2) contact them anonymously 3) if they don't fix it, anonymuosly release it to general public
That way, you can still help them while protecting yourself. The third step is optional of course.
It almost makes me feel that there should be a law requiring disclosure of vulnerabilities.
Most of the stories you hear about people getting in actual trouble over vulnerability research involve web vulnerabilities. You cannot hack someone else's web site to make a point, even if the underlying point is unimpeachable ("this application is insecure and people should know about it").
If this is not an option it means it is something very specific of that company, and what would be the purpose on releasing the vulnerability to the public?
I recommend two shots of wheatgrass and a smoothie.
I wrote this before and I'll say it again. I don't believe in "White Hacker" as a label. Corporations do not do well when their vulnerabilities are exposed. They don't have a way to handle "White Hackers" unless they are the ones hiring them. Most will strike back and punch you in the face no matter how good your intentions are. So if you already spent the time researching and finding the vulnerability, just disclose on a security forum or if you want to profit, sell on a black market.
People who have found vulnerabilities and also been naive about the law have run aground on this before.
Speaking from experience...
My experience is quite to the contrary. Even Intel, as poor as their security response was, didn't try to take legal action against me. (I was lucky that I was unemployed at the time, though...)
But that is an interesting attitude. Instead of being indignant that they didn't offer to pay you for doing their security research for them ( or at least publicly thanking you) you just seem glad that they didn't sue you.
It is like volunteering to help someone and then just being glad they didn't beat you up in the end.
So it seems like there is not much benefit to doing this (there is a benefit if you prevent other people information from being stolen) but immediately there is no upside. You either get ignored or you get sued. If anyone gets sued by a company who has a full department of lawyers on retainer, it is guaranteed they'll pretty much have a bad time.
Its never been legit for such burglars to gain access to a building and leave a note describing the poor security on the CEO's desk.
Unless, of course, you happen to be Richard Feynman. Which most of us aren't.http://www.silvertrading.net/articles_lagniappe_01_richard_f...
But the interesting question is not whether such a list has ever been written. The interesting question is whether such a list is legal to write.
Maybe such a list would be beneficial in the long run. Anyone who has practiced lock-picking knows that most lock-based security is little more than an elaborate honor system.
You also assume that it is the company that will suffer and they are the ones that have to take action. A lot of companies are public facing companies that store and maintain sensitive customer information. I thought the main reason to disclose the research is not to help the company not lose millions at the end of the quarter but to warn their customers that this company can potentially leak your information.
> Its like publishing a list of buildings that don't have good door locks or something.
It is like publishing a list of buildings that store others belongings (like a bank) that doesn't have locks on them. You want to disclose that fact because chances are someone else found the vulnerability and is exploiting it. It would actually seem very irresponsible to not disclose it in that case (after say it turns out many people's stuff goes missing).
I've been doing this for awhile, maybe there's useful advice I can offer him.
I didn't publish the hyperthreading vulnerability to help Intel. I published it to help Intel's customers.
But ideally this isn't going to be a subject you & I are going to end up having to argue about today.
For example, it is fine to take someone else's commercial web app, install it on your own server, and beat it up.
About 526,000 results
http://www.google.com/#hl=en&q=%22white+hat%22+hacker
About 65,000 results
http://www.google.com/search?hl=en&q=%22white%20hacker%22