SonarSource

@SonarSource

SonarSource builds world-class Code Quality & Security tools. Our products empower dev teams to deliver better, safer software

Geneva, Switzerland
Unit: gener de 2013

Tuits

Has blocat @SonarSource

Estàs segur que vols veure aquests tuits? Això no desblocarà @SonarSource.

  1. 25 de des. de 2021

    Java's URI.resolve() will return its parameter if it is an absolute URL, which can be abused to perform SSRF. By using http:/example.com# as artifact the final URL will start with http:/example.com#, which the OkHttp library will accept when making the request.

    Mostra el fil
    Desfés
  2. 24 de des. de 2021

    This is our final code puzzle for this year, thank you all for your participation! 🎅 Please take 2 minutes to fill our feedback form so we can make the next edition even better: We will reach out to the winners over Twitter in early January.

    Mostra el fil
    Desfés
  3. 24 de des. de 2021

    did a great video about the exploitation of such bugs:

    Mostra el fil
    Desfés
  4. 24 de des. de 2021

    This is indeed a format string vulnerability! The second argument of syslog() is supposed to be a format, not arbitrary data. In this case, the compiler emits a warning (-Wformat-security) but that’s not the case for the dependencies you may use.

    Mostra el fil
    Desfés
  5. 24 de des. de 2021

    Can you spot the vulnerability? Can you (re)solve this challenge?

    Mostra el fil
    Desfés
  6. 23 de des. de 2021

    Two bugs were to be found. addslashes() is not enough to protect against SQL injections because the interpolated value is not surrounded by quotes. This value is later used in the external shell call without proper escaping. A payload like 1--$(id>foo) is enough to gain RCE!

    Mostra el fil
    Desfés
  7. 23 de des. de 2021

    Can you spot the vulnerability? Does anybody know where to buy a big Faraday cage?

    Mostra el fil
    Desfés
  8. 22 de des. de 2021

    Can you spot the vulnerability? One bug? Two bugs? You decide!

    Mostra el fil
    Desfés
  9. 22 de des. de 2021

    Extracted files are sanitized against Path Traversals. However, after two dots were removed from the target filename, backslashes were removed. This means that an attacker could craft a path such as .\./.\.shell.jsp, which turns into ../../shell.jsp

    Mostra el fil
    Desfés
  10. 21 de des. de 2021

    Can you spot the vulnerability? How can you do a path traversal if all dangerous characters are removed?

    Mostra el fil
    Desfés
  11. 21 de des. de 2021

    You can achieve RCE by uploading a malicious file called `img-converter.exe` that will then be executed instead of the one installed on the system.

    Mostra el fil
    Desfés
  12. 21 de des. de 2021

    When executing commands by name (e.g. `img-converter`) on Windows, the OS looks for the executable in the current directory first and only after that in the PATH. This applies here because the command is executed in the directory where the file is copied to.

    Mostra el fil
    Desfés
  13. 21 de des. de 2021

    Hint: it has something to do with the PATH!

    Mostra el fil
    Desfés
  14. 20 de des. de 2021

    Can you spot the vulnerability? Sometimes bugs are in the code but they depend on the OS. What can go wrong here on Windows but not on Linux?

    Mostra el fil
    Desfés
  15. 20 de des. de 2021

    It was an easy one for the week-end: after looking at python_jwt, we can notice that the function at line 10 processes the token but does not verify its signature. Thus, in line 12, an attacker can impersonate any user, resulting in login bypass.

    Mostra el fil
    Desfés
  16. 19 de des. de 2021

    Can you spot the vulnerability? Find a bypass and login as an admin!

    Mostra el fil
    Desfés
  17. 19 de des. de 2021

    When parsing the JSON data, fastJSON invokes CSRFToken’s setters, leading to a command injection. This is the theory behind crafting "chains" to exploit arbitrary deserialization vulnerabilities, based on the behaviour of the library and the available classes.

    Mostra el fil
    Desfés
  18. 18 de des. de 2021

    Here is the answer: there are two ways to serialize classes in PHP, both with O: and C:. The second encoding mode is not supported by the blocklist, and arbitrary objects could then be deserialized! It's not enough to get RCE, but it's a good start.

    Mostra el fil
    Desfés
  19. 18 de des. de 2021

    Can you spot the vulnerability? You can never get wrong with JSON.

    Mostra el fil
    Desfés
  20. 17 de des. de 2021

    Can you spot the vulnerability? No more unsafe deserialization with this simple trick.

    Mostra el fil
    Desfés

Sembla que triga molt a carregar-se.

És possible que el Twitter hagi assolit el límit de capacitat o que experimenti una sobrecàrrega momentània. Torna-ho a provar o vés a l'estat del Twitter si en vols obtenir més informació.

    També et pot interessar

    ·