lupi

cow of tailed snake (gay)

avatar by @citriccenobite

you can say "chimoora" instead of "cow of tailed snake" if you want. its a good pun.​


i ramble about aerospace sometimes
I take rocket photos and you can see them @aWildLupi


I have a terminal case of bovine pungiform encephalopathy, the bovine puns are cowmpulsory


they/them/moo where "moo" stands in for "you" or where it's funny, like "how are moo today, Lupi?" or "dancing with mooself"



Bovigender (click flag for more info!)
bovigender pride flag, by @arina-artemis (click for more info)



lexi
@lexi

Hello,

We have assessed this case as Low Impact which is not eligible for bounty. You are eligible to be acknowledged from the CVE that will fix this case.

Kind regards,

Jim
MSRC

i did not have high hopes for a bounty but low impact? come on that's just insulting

mind you, this vuln can get you access to like 20 permissions that you should only get with the user's consent. low impact my ass lmao


lexi
@lexi

i wish i could share this here because i am actually close to going feral over this.

the low impact assessment is somewhat right, at least in their eyes, because they have a fucking fundamental misunderstanding of fucking web security

in fairness, i cant leak the full context, but essentially they think that a vuln that can be triggered via JS/HTML REQUIRES PHYSICAL ACCESS TO THE VICTIMS MACHINE.

I WISH I WAS FUCKING JOKING

i can't share the exact details without leaking parts of the vuln itself so im gonna have to make a followup to this once it got fixed but JESUS FUCKING CHRIST HOW FUCKING DENSE ARE THEY

if you are using edge: please switch browsers immediately, their security team is full of amateurs. i am not joking, please stay as far away from it as possible

edit: for context for the last paragraph, this apparently went through several people and nobody noticed it (if the msrc guy did not lie to me).

read full email exchange (yes msrc does not use the fucking msrc portal but emails security researchers lol)

from MSRC:

Hi ,
Here's an update on your case:
MSRC Case [censored]

We confirmed the behavior you reported. We'll continue our investigation and determine how to address this issue.

Please let me know if you have additional information that could aid our investigation, or if you have questions.

Thanks!

J
MSRC

from MSRC:

Hello,

We have assessed this case as Low Impact which is not eligible for bounty. You are eligible to be acknowledged from the CVE that will fix this case.

Kind regards,

Jim
MSRC

from me:

Hey there, may I ask why this is only Low Impact? This can easily lead to [censored], and can leak a lot of sensitive data. For example, a similar bug on Chromium BBP (which I think can be compared to the Edge BBP, both are for major browsers after all) that abuses the same underlying issue [censored] got rated as High Impact and got bountied: [censored]. Would be nice if someone could look into this again.

from MSRC:

Hello,

We have examined this issue several times and the assessment is low impact because an attacker must have local access to the machine.

I hope this helps?

Kind regards,

Jim
MSRC

emphasis on "We have examined this issue several times". holy fucking shit


You must log in to comment.

in reply to @lexi's post:

in reply to @lexi's post:

i have no clue and i sincerely hope nobody unironically uses edge because if they cant grasp that then i dont want to know how many holes this excuse of a browser has

gotta do the thing you have to do with any bug: find someone who works in security they'll respect, or someone who works for Microsoft and gets it, and tell them to escalate it. but demand credit for bounty.

it sucks but like, soft-nepotism is the way the bigcorp world works

oh yeah i know a guy who knows a guy whos pretty high in microsofts food chain so im not that worried. i am just so baffled at their incompetence because literally someone who has no clue about infosec would get this