Symantec HackIsWack site still open to rickrolling
We know the game and we're gonna play it
Updated Symantec's hapless HackIsWack cybercrime rap competition site can still be rickrolled, despite assurances to the contrary from the security giant.
A web application filter was deployed to block an earlier cross-site scripting attack, but this filter is configured to allow a YouTube video featuring rapper Snoop Dogg, who has been recruited to promote the project, to be displayed. That means that even though the initial attack no longer works, unresolved vulnerabilities on the site mean that it can still be rickrolled onto YouTube videos, as you can see here.
The apt use of Beaker from the Muppets singing Rick Astley is a fitting tribute to the whole HackIsWack endeavour. The rap competition has the laudable aim of raising cybercrime awareness, but is chiefly noteworthy for security snafus that have made Symantec look rather silly, instead of down with the kidz.
The rickrolling cross-site scripting bug was only the most publicised of the site's flaws. Other problems included the caching of potentially sensitive data and upload security problems, among others, according to a write-up by security blogger Mike Bailey last week.
Thus far the contest, which is open to US residents only and closes at the end of the month, has attracted 39 entrants, who have uploaded short self-made rap videos of varying quality to the site. The winner, selected for the best video, earns an all-expense paid trip to LA to see a Snoop Dogg gig along with a laptop running Norton Internet Security.
One wag earlier speculated that Snoop Dogg may have coded up the site as well as acting as a spokesman for the HackIsWack campaign, an outlandish suggestion that is beginning to seem almost plausible. Symantec declined to name and shame HackisWack's clueless coder responding to our questions on the point by saying it's ultimately responsible for the security problems of the site.
Symantec issued a statement on Friday saying it has fixed the latest set of problems with the HackisWack site.
Ultimately, responsibility for the microsite falls on Symantec and we have addressed the issue.
When Symantec was initially made aware of the reported vulnerabilities to the microsite, we quickly took steps to enhance the site's security. With news of this new vulnerability being found, we quickly resolved the issue and are conducting a thorough review of the site's security.
To date, we can confirm that no company or customer data has been compromised or exposed. Symantec takes the security of our website and microsites very seriously, and we have taken the necessary steps to resolve the issue.
The competition itself has attracted 44 entrants by Friday afternoon possibly rather less than the number of wack-minded individuals who have tried to find security vulns with the site.
Mad props to Derek Kolakowski for being the first to pick up on the latest problems with HackIsWack.
Derek reckons Symantec tried to blacklist HTTP/HTTPS connections in response to the earlier exploits. "This leaves them open to the XSS as well potentially local file access," he told El Reg.
Just as well, then, that there's nothing valuable on the site.
Sponsored: Customer Identity and Access Management