4.5 months ago I told a "HIPAA compliant" telemedicine company they were vulnerable to cross-site scripting. if a user is authenticated; + session hijacking. telemed is interesting in COVID times.
Can you guess if they fixed either vuln yet?

#appsec #infosec #HIPAA #nobodycares
So, it's been more than six months now. This is why CVEs and reporting directly to vendors is pointless and soul crushing. @Bugcrowd is pointless too if you're not interested in money for reports. Reference this current thread and
Here are some fun prints of what
#infosec is. Note, the second DM was really fast and did follow through to put me in contact with the right person. thank you twitter person #2. It fizzled out though after that at no fault of person #2. ImageImageImage
Checked today and guess what? Multiple sites that use this SaaS are vulnerable to Cross-site Scripting and Session Hijacking. I did no real testing, just very basic stuff to confirm if it's still vulnerable. Imagine if they did a real test?
Why don't I put them on blast? Because, there are thousands of people using Telemedicine right now due to COVID and everything else going on. I believe it will only put my family, friends, and general public at risk if I do.
So what will I do next. I guess just report them to @USCERT_gov and see what happens. I do believe this is a #HIPAA violation anyway.
Stay safe everyone. Try not to lose your shi when trying to fix all of the things. #nobodycares :(
8 months now; Session Hijacking & Cross-site Scripting reported. Can be used to compromise Protected Health Information (PHI).

Rather than showing impact and ending up on @DarknetDiaries 😅 I will report to @USCERT_gov this week. I will try to doc the process & post for others.
Today is the 1 yr anniversary of informing a company & some of the insurance providers that use them that they have multiple vulnerabilities such as Cross-site Scripting & Session Hijacking. I didn't want to put them on blast because of the major uptick in virtual DR visits.
I never did end up going to @USCERT_gov because I just don't have the energy or time anymore. As a matter a fact, I've blown off so many vulns due to not having the energy to chase these companies down month, after month, after month.
I'm not even trying to hack. Some of it is just so bad that you can't miss it or un-see it. You just feel like they should know for them and the people that use their products. Especially, healthcare, etc.
Because of that, I'm changing how I personally define responsible disclosure. In the past I would notify, give plenty of time to fix it, i would help them fix it if needed (for free), and then i would coordinate public disclosure in some cases. it's just freaking exhausting.
New process:
1. Notify of vulnerability.
2. Provide plenty of evidence.
3. Disclose after 90 days fixed or not.
I will not argue if something is a vulnerability or not. If it's not, who cares if it's disclosed.
I will not use 3rd parties such as Bugcrowd. They will not help hide the truth. I'm not trying to get paid when I inform companies about vulnerabilities. I am telling them so they can protect their users, myself, and for their own good.
@MDLIVEInc was the start of this thread.
@Cigna, who use's MDLive's "HIPAA" compliant service for "24/7 Access to Board Certified Doctors" was also notified. The conversations you see in this thread are with them.
Here is a very basic example of XSS in @MDLIVEInc and @Cigna's sites. There's more. They were notified of 8-12 months ago:
members.mdlive.com/login?flash=In…<img%20src=/%20onerror=alert(document.cookie)>n
mdliveforcigna.com/login?flash=In…<img%20src=/%20onerror=alert(document.cookie)>n
Just to close this threat out for now: some of the mentioned vulnerabilities were quickly remediated after this last post. Specifically, the XSS. Thank you.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Robert Gilbert

Robert Gilbert Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @amr00t

13 Oct 18
I don't get paid to hack, I get paid to write reports. 👍#Pentesting

#infosec #appsec
@MrErickMars I’m sure there’s more qualified people with fresh ideas that can give you a better answer. Additionally, there’s no short answer. There's the canned response “you just have to work hard!”. Instead I’m going to ramble off a few things to hopefully help someone along.
Be ethical. At some point, as a penetration tester, someone will ask you to hack something as a favor or for a profit without proper authorization. Get caught once and all your credibility is gone. Don't kill a cow for a few steaks when you can live off the milk for years.
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!