From: Paul Ferguson (RD-US)
Sent: Tuesday, September 07, 2010 9:23:27 AM
Subject: NEWSBANK:: Symantec finally secures HackIsWack
Auto forwarded by a Rule
Symantec finally secures HackIsWack
It's such a bungle, sometimes, it makes you wonder...
Symantec has belatedly secured its laughable HackIsWack competition website.
The site - a collaboration between the security software firm and rapper Snoop Dogg - is designed to raise awareness about malware and identity theft by providing a forum for a user-generated cybercrime-themed rap competition. The site had a slow start, and currently boasts an underwhelming 22 videos.
Even more embarrassingly the security giant went live with a branded site that was riddled with security holes, including a cross-site scripting flaw that amusingly lent itself to a rickrolling attack. In a statement issued over the weekend, Symantec acknowledged the problems, which it said were now resolved.
Symantec was made aware of reported vulnerabilities to the Norton Hack is Wack microsite, and we quickly took the necessary steps to enhance security on the site. We have found no evidence to date that any intrusion into the site or other areas of Symantec’s network or website have occurred.
To date, Symantec can confirm that no company or customer data has been compromised or exposed. Symantec takes the security of our website and microsites very seriously, and we have taken the necessary steps to resolve this issue.
The statement fails to explain why Symantec went live with an apparently untested and seriously flawed site, which one wag suggested might have been coded by Snoop Dogg rather than an experienced security-aware web developer.
The rickrolling XSS was only the most publicised of the site's many flaws. Security blogger Mike Bailey did a good job last week in compiling a list of numerous flaws present on the site at the time, which included the caching of potentially sensitive data and upload security problems, among others.
Hack is Wack site is chock full of holes. For example, there's the publicly available, indexed cache directory with all that SQL, JSON and other data. There's the XSS vulns (HTML5 only, though it should be simple enough to rewrite), CSRF holes, and the Flash upload issues in the video upload script (a Joomla module that appears to have been used without any quality control or review despite the fact that it's currently in Alpha)
The original XSS rickrolling exploit has been blocked and, we take on trust but have not confirmed, Symantec has also mopped up the other flaws on the site.
"Fergie", a.k.a. Paul Ferguson
Trend Micro, Inc., Cupertino, California USA