website statistics
Mega, the online storage service launched by Kim Dotcom, has recently announced that it would hand out payouts to those who'd find bugs in the service. Now, it has lived up to that promise.

What new Apple device you are getting?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

After the launch of his online storage service, Mega, Kim Dotcom had offered reward to the tune of $13,500 to such users who’d discover security vulnerabilities in the service. As it happens, seven bugs have been reported and fixed so far and three cash rewards have been handed out by the company.

Mega Bounty

The handouts suggest that Dotcom is indeed serious in making his service impregnable in terms of security. However, the fact that seven bugs were found during the first week alone tends to hint that the service may not be so secure for now.

Dotcom has stated that the reward program is meant for the long-term and as users keep finding newer bugs, they will be rewarded in cash for their discoveries. The seven bugs found during the week and deemed eligible for bounty are listed below:

  • One Class IV vulnerability: Invalid application of CBC-MAC as a secure hash to integrity-check active content loaded from the distributed static content cluster. Mitigating factors: No static content servers had been operating in untrusted data centres at that time, thus no elevated exploitability relative to the root servers, apart from a man-in-the-middle risk due to the use of a 1024 bit SSL key on the static content servers. Fixed within hours.
  • Three Class III vulnerabilities: i) XSS through file and folder names. Mitigating factors: None. Fixed within hours. Ii) XSS on the file download page. Mitigating factors: Chrome not vulnerable. Fixed within hours. iii) XSS in a third-party component (ZeroClipboard.swf). Mitigating factors: None. Fixed within hours.
  • One Class II vulnerability: XSS through strings passed from the API server to the download page (through three different vectors), the account page and the link export functionality. Mitigating factors – apart from the need to control an API server or successfully mounting a man-in-the-middle attack –: None. Fixed within hours.
  • Two Class I vulnerabilities: i) HTTP Strict Transport Security header was missing. Fixed. Also, and * will be HSTS-preloaded in Chrome. Ii) X-Frame-Options header was missing, causing a clickjacking/UI redressing risk. Fixed.

While we don’t know exactly what amounts of bounties were handed out to those who discovered the bugs, Dotcom did reveal that at least one of the finders was awarded a cash prize of EUR 1000.

Courtesy: TNW

Buy Cheapest Related Product From

Yahoo-Backed Email Service Hacked, Users Receive Spam

iOS 6 Jailbreak Evasi0n Already Unlocks 7 Million Devices
You can also press the left/right arrow key on your keyboard to go to previous/next post

Tags: , ,

  On February 11, 2013(2 years, 7 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook