Bug bounty by Detectify

Bug bounty by Detectify

by George Mihailov -
Number of replies: 1

Our friends from Detectify are looking to collaborate with the Moodle community and run a security bughunting event. 

The idea is to try to make the internet a bit safer by collaborating with open source projects by organizing an online event for hackers over a weekend. Detectify will sponsor hackers for what they find (after it's verified to be relevant and interesting, of course). The information regarding what they find will then be shared with the right person/people at the affected project to make sure it's handled in a responsible manner.

Marina, what do you think about it?

Some extra info https://detectify.com/crowdsource

Average of ratings: -
In reply to George Mihailov

Re: Bug bounty by Detectify

by Marina Glancy -
Picture of Core developers Picture of Moodle Workplace team Picture of Peer reviewers Picture of Plugin developers Picture of Testers

Hello George,

Thanks for this initiative.

Moodle security procedures are described here. Please do not post on forums about security vulnerabilities you have found! Also this is a good page describing different security practices and vulnerabilities.

There are a couple of things I'd like to say to the contestants:

1. If you use automated penetration tests please make sure not to submit the raw results but instead go through the report and test each case to make sure it is not a false positive. For example, search forms do not need CSRF protection since search results can be linked to directly, however pentests report a form without sesskey as a security threat. Also keep in mind that pentests are not very helpful when looking for privilege escalation and many other types of vulnerabilities related to authenticated users.

2. There are users in Moodle who are allowed to insert scripts in the text fields. They have capabilities marked with XSS risk and they appear on the report Site administration > Reports > Security overview in the section "XSS trusted users". Default "Student" role does not have such capabilities but default "Teacher" role has quite a few of them. If you want to report XSS vulnerability make sure that you can reproduce it as a user without capabilities marked with XSS risk.

3. Make sure to include reproduction instructions in the reports about how the vulnerability can be used to attack other users, compromise data or affect the site/server work.

4. And, of course, always use the latest supported versions. Otherwise you may find the issue that was already fixed or an issue on a version that is out of support. At the time of writing the latest security-supported versions are: 3.1.11, 3.2.8, 3.3.5 and 3.4.2 . Check Version support page for up-to-date information.

Looking forward seeing your reports and making Moodle even more secure and reliable.
Average of ratings: Useful (4)