Embrace The Red
Machine Learning Attack Series: Backdooring Keras Models and How to Detect It
This post is part of a series about machine learning and artificial intelligence. Adversaries often leverage supply chain attacks to gain footholds. In machine learning model deserialization issues...
watchTowr Labs - Blog
QNAP QTS - QNAPping At The Wheel (CVE-2024-27130 and friends)
Infosec is, at its heart, all about that data. Obtaining access to it (or disrupting access to it) is in every ransomware gang and APT groups top-10 to-do-list items, and so it makes sense that our research voyage would, at some point, cross paths with products intended to
Embrace The Red
Pivot to the Clouds: Cookie Theft in 2024
Recently Google published a blog about detecting browser data theft using Windows Event Logs. There are some good points in the post for defenders on how to detect misuse of DPAPI calls attempting ...
Google Online Security Blog
I/O 2024: What’s new in Android security and privacy
Posted by Dave Kleidermacher, VP Engineering, Android Security and Privacy Our commitment to user safety is a top priority for Android. ...
HackerOne - HackerOne
high - any user could upload attachments to pentest scoping form they don't have access to (7500.00USD)
The root cause of this issue appears to be insufficient access controls implemented in the attachment upload functionality for pentest scoping forms. The endpoint responsible for handling attachment uploads did not properly validate the user's access rights to the specific scoping form, allowing any authenticated user to upload files as long as they had the scoping form ID. According to the...
talosintelligence.com
Adobe Acrobat Reader Font gvar GlyphVariationData out-of-bounds read vulnerability
Discovered by KPC of Cisco Talos. SUMMARY An out-of-bounds read vulnerability exists in the Font functionality of Adobe Acrobat Reader 2023.008.20470.A specially crafted font file embedded into a P...
GitHub
Tenant Separation Bypass via Mantis Message Server API
### Impact An authenticated user can issue a message server API request that exploits an access control issue, allowing them to bypass tenant isolation controls and exfiltrate job processing metad...
talosintelligence.com
Adobe Acrobat Reader Font CPAL numColorRecords out-of-bounds read vulnerability
Discovered by KPC of Cisco Talos. SUMMARY An out-of-bounds read vulnerability exists in the Font functionality of Adobe Acrobat Reader 2023.008.20533.A specially crafted font file embedded into a P...
jub0bs.com
Reconfigurable CORS middleware with jub0bs/cors
TL;DR In this short follow-up to my previous post, I describe why and how I’ve added support for dynamic reconfiguration of CORS middleware in jub0bs/cors. Rethinking configuration immutability Up until now, I’ve been arguing that CORS middleware should not be reconfigurable on the fly and that any change to their configuration should require a server restart: Insofar as CORS relaxes some of the restrictions enforced by the SOP, it is a security-critical mechanism.
SSD Secure Disclosure
SSD Advisory – D-Link DIR-X4860 Security Vulnerabilities
Summary Security vulnerabilities in DIR-X4860 allow remote unauthenticated attackers that can access the HNAP port to gain elevated privileges and run commands as root. By combining an authentication bypass with command execution the device can be completely compromised. Credit A security researcher working with SSD Secure Disclosure Vendor Response The vendor has been reached out … Read More »
Google Online Security Blog
Google and Apple deliver support for unwanted tracking alerts in Android and iOS
Google and Apple have worked together to create an industry specification Detecting Unwanted Location Trackers for Bluetooth trackin...
Project Zero Bug Tracker
Arm Mali 5th Gen: dangling ATE via short alias of large page
Zero Day Initiative
CVE-2024-21115: An Oracle VirtualBox LPE Used to Win Pwn2Own
In this guest blog from Pwn2Own winner Cody Gallagher, he details CVE-2024-21115 an Out-of-Bounds (OOB) Write that occurs in Oracle VirtualBox that can be leveraged for privilege escalation. This bug was recently patched by Oracle in April. Cody has graciously provided this detailed write-up
Shipt - HackerOne
high - Improper Access Control + Financial fraud allows attacker to disclose + add arbitrary products to another's user's order (3900.00USD)
## Context The [https://www.shipt.com](https://www.shipt.com) website allows users to place orders and **modify** them after they were placed. To modify an order after it was placed, it must be in a state **before** the shopping is in progress. This allows customers to adjust an order before its final shipment ## Vulnerability It is possible to **add arbitrary products** to another's user's...
curl - HackerOne
critical - Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities.
## Summary: Octal Type Handling of Errors in IPv4 Mapped IPv6 Addresses in curl allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on curl. [RFC 4291](https://datatracker.ietf.org/doc/html/rfc4291#section-2-5-5) defines ways to embed an IPv4 address into IPv6 addresses. One of the methods defined in the RFC is to use...
Synacktiv
Understanding and evading Microsoft Defender for Identity PKINIT detection
Introduction Last year, Microsoft released a blogpost about the introduction of Active Directory Certificate Services (ADCS) based detections in Microsoft Defender for Identity (MDI).
windows-internals.com
Secure Kernel Research with LiveCloudKd
Lets say you want to research the secure kernel. You heard about hypervisors and VTL1 and youd like to see it for yourself, and static analysis is just not always good enough. You need a debugger...
Zero Day Initiative
CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
In this guest blog from Master of Pwn winner Manfred Paul, he details CVE-2024-2887 a type confusion bug that occurs in both Google Chrome and Microsoft Edge (Chromium). He used this bug as a part of his winning exploit that led to code execution in the renderer of both browsers. This bug was quic
Google Online Security Blog
Your Google Account allows you to create passkeys on your phone, computer and security keys
Sriram Karra and Christiaan Brand, Google product managers Last year, Google launched passkey support for Google Accounts. Passkeys are a n...
blog.doyensec.com
Product Security Audits vs. Bug Bounty
Product Security Audits vs. Bug Bounty
IBM - HackerOne
critical - Insecure Direct Object Reference Protection bypass by changing HTTP method in IBM Your Learning endpoint.
Insecure Direct Object Reference vulnerability was reported to IBM, analyzed and has been remediated. Thank you to our external researcher.
talosintelligence.com
Tinyproxy HTTP request parsing uninitialized memory vulnerability
ERROR 404 SORRY, THIS PAGE DOES NOT EXIST. WE WERE OUT HUNTING BAD GUYS AND MUST HAVE MISSED UPDATING THIS LINK SOMEWHERE. OR YOU MISTYPED.
talosintelligence.com
Tinyproxy HTTP Connection Headers use-after-free vulnerability
Discovered by Dimitrios Tatsis of Cisco Talos. SUMMARY A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTT...
talosintelligence.com
stb stb_vorbis.c comment heap-based buffer overflow vulnerability
Discovered by Francesco Benvenuto of Cisco Talos. SUMMARY A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can le...
talosintelligence.com
Milesight UR32L luci2-io file-import firmware update vulnerability
Discovered by Francesco Benvenuto of Cisco Talos. SUMMARY A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted netwo...
Google Online Security Blog
Detecting browser data theft using Windows Event Logs
Posted by Will Harris, Chrome Security Team Chromium's sandboxed process model defends well from malicious web content, but...
Synacktiv
iOS: a journey in the USB networking stack
There is an ongoing hot topic in the Synacktiv development team between a handful of iOS developers that are willing to work on a full macOS environment and people that'd rather spend an insane amount
STAR Labs
Send()-ing Myself Belated Christmas Gifts - GitHub.com's Environment Variables & GHES Shell
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively simple, one-liner vulnerability which I initially assessed to likely be of low impact, and how I turned it into one of the most impactful bugs in GitHubs bug bounty history. Spoiler: The vulnerability enabled disclosure of all environment variables of a production container on GitHub.
talosintelligence.com
Foxit Reader Barcode widget Calculate event use-after-free vulnerability
Discovered by KPC of Cisco Talos. SUMMARY A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicio...
talosintelligence.com
Foxit Reader Lock object fields property type confusion vulnerability
Discovered by KPC of Cisco Talos. SUMMARY A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code insid...
talosintelligence.com
Foxit Reader ComboBox widget Format event use-after-free vulnerability
Discovered by KPC of Cisco Talos. SUMMARY A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malici...
Internet Bug Bounty - HackerOne
high - Assertion failed in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash (3645.00USD)
Assertion failed in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash (CVE-2024-27983) - (High) An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the...
Google Online Security Blog
How we fought bad apps and bad actors in 2023
Posted by Steve Kafka and Khawaja Shams (Android Security and Privacy Team), and Mohet Saxena (Play Trust and Safety) A safe and trusted ...
The GitHub Blog
CodeQL zero to hero part 3: Security research with CodeQL
Learn how to use CodeQL for security research and improve your security research workflow.
HackerOne - HackerOne
critical - Attachment disclosure via summary report
A critical vulnerability was discovered in the HackerOne platform that allowed an attacker to gain unauthorized access to attachments belonging to other users through the report summary editing functionality. By manipulating attachment IDs in the request, an attacker could view sensitive files that should have been restricted. The core issue was an Insecure Direct Object Reference (IDOR)...
Google Online Security Blog
Accelerating incident response using generative AI
Lambert Rosique and Jan Keller, Security Workflow Automation, and Diana Kramer, Alexandra Bowen and Andrew Cho, Privacy and Security Inciden...
Praetorian
Local Privilege Escalation Vulnerability in Ant Media Server (CVE-2024-32656)
Praetorian identifies a local privilege escalation vulnerability arising from the application exposing an unauthenticated Java Management Extensions (JMX) remote management interface on localhost that was accessible by unprivileged local operating system users.
PlayStation - HackerOne
high - Remote vulnerabilities in spp (12500.00USD)
## Summary A malicious PPPoE server can cause denial-of-service or potentially remote code execution in kernel context on the PS4/PS5. ## Heap buffer overwrite and overread in sppp_lcp_RCR and sppp_ipcp_RCR For some reason, the PS4/PS5 is vulnerable to [CVE-2006-4304](https://www.freebsd.org/security/advisories/FreeBSD-SA-06:18.ppp.asc). By having invalid options, it is possible to cause a...
Project Zero Bug Tracker
PowerVR: writability check in PMRMMapPMR() does not clear VM_MAYWRITE
Google Online Security Blog
Uncovering potential threats to your web application by leveraging security reports
Posted by Yoshi Yamaguchi, Santiago Daz, Maud Nalpas, Eiji Kitamura, DevRel team The Reporting API is an emerging web standard that pr...
Mozilla - HackerOne
critical - Jira Credential Disclosure within Mozilla Slack
The reporter who is an NDA'd contributor with access to internal Mozilla slack instance found a Jira admin API token hard-coded in a script which was shared in a public slack channel. The API key was revoked and the script was deleted from the public channel.
Internet Bug Bounty - HackerOne
high - Denial of Service caused by HTTP/2 CONTINUATION Flood (4860.00USD)
CVE-2024-24549 Apache Tomcat - Denial of Service Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 11.0.0-M1 to 11.0.0-M16 Apache Tomcat 10.1.0-M1 to 10.1.18 Apache Tomcat 9.0.0-M1 to 9.0.85 Apache Tomcat 8.5.0 to 8.5.98 Description: When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated...
Hyperledger - HackerOne
high - Docker Secret Disclosure via GitHub Actions Cache Poisoning (2000.00USD)
An issue was reported whereby GitHub secrets were leaked via GitHub Actions. We worked with the reporter to resolve this issue, and it appears widespread.
Google Online Security Blog
Prevent Generative AI Data Leaks with Chrome Enterprise DLP
Posted Kaleigh Rosenblat, Chrome Enterprise Senior Staff Software Engineer, Security Lead Generative AI has emerged as a powerful and pop...
Project Zero - Root Cause Analysis
CVE-2023-6345:
Information about 0-days exploited in-the-wild!
Zero Day Initiative
CVE-2024-20697: Windows Libarchive Remote Code Execution Vulnerability
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Guy Lederfein and Jason McFadyen of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in Microsoft Windows. This bug was originally discovered by the Microsoft Offensive Re
Unit 42
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
We detail Operation MidnightEclipse, a campaign exploiting command injection vulnerability CVE-2024-3400, and include protections and mitigations.
Project Zero Bug Tracker
Windows Kernel subkey list use-after-free due to mishandling of partial success in CmpAddSubKeyEx
Zero Day Initiative
The April 2024 Security Updates Review
Its the second Tuesday of the month, and Adobe and Microsoft have released a fresh crop of security updates. Take a break from your other activities and join us as we review the details of their latest advisories. If youd rather watch the full video recap covering the entire release, you can check
Node.js - HackerOne
high - "Assertion failed" in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header...