Analytics

5/30/2018
06:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System

In less than one month, security researchers participating in the Pentagon's Hack the Defense Travel System program found 65 vulnerabilities.

White-hat hackers participating in a US Department of Defense bug bounty initiative recently rooted out 65 unique security vulnerabilities in the Defense Travel System (DTS), an enterprise application used by millions of DoD workers worldwide.

In less than one month, more than two dozen of the uncovered flaws — 28 — were flagged as high or critical in severity, according to HackerOne, the entity that managed the initiative for the DoD.

The DoD's Hack the DTS (Defense Travel System) contest is part of a broader DoD crowd-sourced bug hunting initiative called Hack the Pentagon. It's the fifth time the DoD has used such a program to try and proactively find vulnerabilities in important systems that its own security organizations might have missed. So far, since its launch in April 2016, the Hack the Pentagon program has helped the DoD find and fix some 3,600 vulnerabilities in total.

The Hack the DTS program ran from April 1 to April 29. A total of 19 security researchers participated in it and employed a bag of tricks including social engineering to try and find vulnerabilities in DTS that could be exploited. To be eligible to participate, the security researchers had to be citizens of or be eligible to work in the US, UK, Australia, Canada, or New Zealand.

In the 29 days that the program ran, the researchers reported a total of 100 vulnerabilities, of which 65 were confirmed to be valid issues. Sixteen of them were uncovered less than 24 hours after the Hack the DTS challenge launched.

Researchers who reported valid security flaws received varying bug bounties. Eight of the reported vulnerabilities garnered the maximum bounty of $5,000. In all, the DoD paid out a total of $78,650 to the security researchers who discovered the vulnerabilities.

Crowd-sourced bug hunting programs such as those managed by HackerOne, Bugcrowd, and Synack have surged in popularity in recent years. The programs have attracted tens of thousands of security researchers from around the world willing to find and disclose security vulnerabilities in return for monetary rewards.

For many organizations, the programs have offered a way to let outside security researchers take a crack at their websites and apps in a relatively controlled and managed environment.

For security researchers, bug bounty programs have offered an opportunity to monetize their bug hunting and vulnerability discovery work. Bug hunters can earn anything from a few hundred dollars for low-level submissions to tens- and even hundreds of thousands of dollars for major bug discoveries.

For organizations, the programs have offered a way to discover and fix flaws they might have otherwise missed, often at considerably lower cost than recruiting full-time employees to do it.

The model, says HackerOne CEO Marten Mickos, has been gaining traction within government as well.

"When Hack the Pentagon was launched in 2016, it marked a change in the entire industry," he says. "The world's most powerful organization decided it needed the help of external hackers to be secure."

Other federal agencies and corporations worldwide have taken the cue from DoD and have launched similar hacker-powered security programs, he says. Last year's bill directing the Department of Homeland security to launch a Hack the DHS program is one example of the continued momentum. The Singapore Ministry of Defense, the European Commission, and the tax authorities in Finland are all other examples, Mickos says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devidlaws
50%
50%
Devidlaws,
User Rank: Apprentice
5/31/2018 | 5:05:08 AM
Router
Hey, I read the article it was great for everyone. My friends are suggested me to read it. So that they are true it was great. But if you want to know more about it then visit the site. Internet Explorer 10 customer service.
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12242
PUBLISHED: 2018-09-19
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to an authentication bypass exploit, which is a type of issue that can allow attackers to potentially circumvent security mechanisms currently in place and gain access to the system or network.
CVE-2018-12243
PUBLISHED: 2018-09-19
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to a XML external entity (XXE) exploit, which is a type of issue where XML input containing a reference to an external entity is processed by a weakly configured XML parser. The attack uses file URI schemes or relative paths i...
CVE-2018-14792
PUBLISHED: 2018-09-19
WECON PLC Editor version 1.3.3U may allow an attacker to execute code under the current process when processing project files.
CVE-2018-16607
PUBLISHED: 2018-09-19
Cross-site scripting (XSS) vulnerability in the Orgs Page in Open-AudIT Professional edition in 2.2.7 allows remote attackers to inject arbitrary web script via the Orgs name field.
CVE-2018-16785
PUBLISHED: 2018-09-19
XML injection vulnerability exists in the file of DedeCMS V5.7 SP2 version, which can be utilized by attackers to create script file to obtain webshell