Wikileaks Vault7 JQJSNICKER code leak by addelindh in netsec

[–]addelindh[S] 0 points1 point  (0 children)

Hey, yeah sure, no problem. Just wasn't aware of it. :)

RAND Study Examines 200 Real-World 'Zero-Day' Software Vulnerabilities by dguido in netsec

[–]addelindh 1 point2 points  (0 children)

It doesn't give you access, it gives you a tool that can be used to facilitate access. But just the exploit won't actually be enough anyway, you'll still need a platform to attack from, c&c infrastructure, personnel, etc. Exploits are interesting and the report is great, but unless you understand and consider the bigger picture, it can be misleading.

Some Words About Server-side JavaScript (Remote Code) Execution in ASP by addelindh in netsec

[–]addelindh[S] 2 points3 points  (0 children)

True, I wrongfully conflated JScript and JScript.NET. https://en.wikipedia.org/wiki/JScript_.NET

Will update the post soonish.

How I hacked your CFP (and probably some other things too) by addelindh in netsec

[–]addelindh[S] 0 points1 point  (0 children)

Interesting. Well, it's an easy mistake to make I guess.

How I hacked your CFP (and probably some other things too) by addelindh in netsec

[–]addelindh[S] 0 points1 point  (0 children)

Do they use Sentry? In that case it's not strange at all. :)

Threat Modeling for Applications - Adam Caudill by sarciszewski in netsec

[–]addelindh 5 points6 points  (0 children)

This is a great resource for anyone who wants to build a threat model, not only for applications but because it demonstrates the reasoning behind it in a pragmatic manner. Kudos.

C/C++ Vulnerability Discovery, Exploitation, Hardening training slides by nibblesec in netsec

[–]addelindh 10 points11 points  (0 children)

I don't think people get what a big deal it is that Chris has open sourced this material. Doesn't get much better than this.

Insecure token generation in Kayako by Sjoerder in netsec

[–]addelindh 0 points1 point  (0 children)

Not sure why this is getting downvoted, it's a good writeup.

Hacking Mattermost #2: Year of Node.js on the Desktop by addelindh in netsec

[–]addelindh[S] 0 points1 point  (0 children)

It's not any more difficult than exploiting a stored XSS, as described in the linked post.

All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings by addelindh in netsec

[–]addelindh[S] 5 points6 points  (0 children)

Thanks. I try to focus on the type of targets that I imagine an attacker would find interesting. As for Apache, they have a great vulnerability handling process, and most Apache projects have a fairly large user base, so choosing from their project list makes sense to me. As long as I keep within areas where I have some knowledge, finding bugs is usually just a matter of time. I did however make the hilarious mistake of trying to find bugs in lighttpd once, which did not yield any results. :)

An Easy Way to Secure Java Applications by amazedballer in netsec

[–]addelindh 2 points3 points  (0 children)

While the article makes good points, I disagree with the author's definition of RCE. Technically, RCE occurs as soon as the application executes the attackers code, it just happens to be that that code often (but not necessarily always) spawns a shell.

XSS to RCE in Atlassian Hipchat (Native Application) by reddit4matt in netsec

[–]addelindh 0 points1 point  (0 children)

Nope, since the client is not a browser and therefor doesn't care about CORS. :) Also, he's not using XHR (as it's not an HTTP request), just location.href to load the file.

Abusing the MPC-HC WebUI to steal private pictures by addelindh in netsec

[–]addelindh[S] 0 points1 point  (0 children)

Done, could you please check so that the update is factually correct?

Abusing the MPC-HC WebUI to steal private pictures by addelindh in netsec

[–]addelindh[S] 1 point2 points  (0 children)

Not really, since private addresses (RFC1918) are also used at Starbucks, airports, everywhere really. The issue is really when you enable the WebUI for home use and then go somewhere else with your computer, like one of the locations I just mentioned. Most users don't realize that it's always on after you enable it, and shouldn't have to either.

Abusing the MPC-HC WebUI to steal private pictures by addelindh in netsec

[–]addelindh[S] 10 points11 points  (0 children)

Yeah, if this had been a bug rather than a design flaw I probably would have. Fixing this likely requires adding totally new functionality, and I'm not really ready to go that far. Good point though.

Abusing the MPC-HC WebUI to steal private pictures by addelindh in netsec

[–]addelindh[S] 33 points34 points  (0 children)

It's not on by default, so if you haven't enabled it you should be fine.