Wednesday, February 12, 2025
HomeBug BountyResearchers Breach Software Supply Chain and Secure $50K Bug Bounty

Researchers Breach Software Supply Chain and Secure $50K Bug Bounty

Published on

SIEM as a Service

Follow Us on Google News

A duo of cybersecurity researchers uncovered a critical vulnerability in a software supply chain, landing them an extraordinary $50,500 bug bounty.

The exploit, described as an “Exceptional Vulnerability,” not only exposed systemic flaws in software supply chain security but also demonstrated just how far-reaching the impact of overlooked weak points can be.

The researchers, who go by the pseudonyms “Snorlhax” and a collaborator, shared their meticulous, multi-pronged approach in a detailed disclosure.

The two first joined forces years ago out of a competitive camaraderie but soon realized that collaboration could lead to even bigger wins.

Together, they identified and reported vulnerabilities ranging across IDORs, SQL Injection, XSS, and more.

However, their ultimate goal remained elusive for years: to discover a world-class vulnerability capable of earning a bounty well beyond standard payouts.

The opportunity finally came when they zeroed in on the software supply chain of a newly acquired subsidiary of a major company.

Their target, Inadequate integration practices within the subsidiary, a common weak point in mergers and acquisitions.

Exploiting the Software Supply Chain

Their hunt began by analyzing public information about the company’s acquisitions and carefully mapping out the subsidiary’s software ecosystem.

Using advanced techniques, including analyzing JavaScript files and Docker images, they identified vulnerabilities in the subsidiary’s supply chain—a critical area encompassing source code, build processes, and deployment pipelines.

The breakthrough came when they discovered an oversight in a Docker image hosted on DockerHub. Inside the container, they found proprietary backend source code.

Digging deeper, they realized the container still contained a .git folder, complete with a misconfigured GitHub Actions token.

acquisition-utils

This token, which was left behind during the container’s build process, granted access to private GitHub repositories associated with the target company.

Their discovery didn’t end there. By extracting additional layers of the Docker image, they recovered an improperly removed .npmrc file containing a private npm token.

This token allowed the duo to tamper with private npm packages, effectively offering a way to inject malicious code into the development pipelines, staging environments, and even production servers.

The attack vector could have compromised everything from developer machines to the company’s CI/CD pipelines and live applications.

The Impact and Response

The duo meticulously documented their findings, highlighting how attackers could use the compromised token to insert backdoors into npm packages relied on throughout the organization.

Once the package was fetched in development or production environments, attackers could exfiltrate sensitive data or escalate their access.

escalate their access
escalate access

The company’s security team classified the vulnerability as a “worst-case scenario” due to its potential to disrupt the entire software development lifecycle.

They promptly mitigated the flaws and rewarded the researchers with an off-the-charts bounty of $50,500.

This case underscores a critical reality: the software supply chain, especially in newly acquired subsidiaries, remains a high-value target for attackers.

Code Snippet from Their Discovery

Here’s an example of the .git/config file they used to retrieve the sensitive GitHub Actions token:

[core]
               repositoryformatversion = 0
               filemode = true
               bare = false
               logallrefupdates = true
[remote "origin"]
               url = https://github.com/Acquisition/backend
               fetch = +refs/heads/*:refs/remotes/origin/*
[http "https://github.com/"]
               extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46TG9sWW91V2FudGVkVG9TZWVUaGVUb2tlblJpZ2h0Pw==

Similarly, by exploring earlier Docker layers, they discovered the missing .npmrc file containing:

//registry.npmjs.org/:_authToken=<PRIVATE_NPM_TOKEN>

The researchers emphasized the importance of securing every layer of the supply chain, from source code to deployment artifacts, to prevent such catastrophic vulnerabilities.

The successful exploit also serves as a testament to the power of collaboration and innovative thinking in ethical hacking.

By targeting overlooked areas like Docker layers, hidden tokens, and subsidiary integrations, the researchers demonstrated that the biggest vulnerabilities often lie where organizations least expect them.

For enterprises, this serves as a wake-up call: securing software means securing not just the code but the entire process, from builds to deployments.

For the researchers, it was a career milestone—a story of persistence, ingenuity, and the payoff of finding that one “Exceptional Vulnerability.”

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...