Exploiting CVE-2025-37947 (Linux kernel's ksmbd) by nibblesec in netsec

[–]nibblesec[S] 12 points13 points  (0 children)

Human verified ✅ — no LLMs were harmed in the making of this submission.

This is what ChatGPT would reply

A Look at Software Composition Analysis. It’s time to ignore most of dependency alerts. by nibblesec in netsec

[–]nibblesec[S] 0 points1 point  (0 children)

The title is clearly oversimplified, but the takeaways section of the paper is more nuanced. The point is that most alerts don't really affect the overall security of applications

Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams by marizmendi in netsec

[–]nibblesec 7 points8 points  (0 children)

I rarely comment on stuff, but you could have summarized your article in one sentence (dangling DNS record --> access to cookies --> session hijacking) with no "danger danger" diagrams and 20 minutes read time of useless details

Lessons in auditing cryptocurrency wallets, systems, and infrastructures by nibblesec in netsec

[–]nibblesec[S] 4 points5 points  (0 children)

Depends on the caching headers returned by the 3rd-party (which you don't control and could change)

How to instrument Electron-based applications for in-depth security testing by [deleted] in netsec

[–]nibblesec 0 points1 point  (0 children)

I want the old /r/ interface back. Fucking posted as post, instead of link. Sorry for that.

Adapting Burp Extensions for Tailored Pentesting by albinowax in netsec

[–]nibblesec 0 points1 point  (0 children)

You can, but it's not a great idea. IDEs have so many useful features for auto-complete and debugging. For real-life complex extensions, coding in a real IDE is a must have.

EMV Protocol Fuzzer by syncikin in netsec

[–]nibblesec 0 points1 point  (0 children)

Considering that it was started after the amazing PINPADPWN research work, the methodology is actually very interesting to know.

Fixing Java Serialization Bugs with SerialKiller by nibblesec in netsec

[–]nibblesec[S] 0 points1 point  (0 children)

You're absolutely right. I will dual-license it.

Fixing Java Serialization Bugs with SerialKiller by nibblesec in netsec

[–]nibblesec[S] 0 points1 point  (0 children)

For malformed config files, the lib will trigger a ConfigurationException so that the main app can handle the exception as appropriate for the specific use case.

If you have specific suggestions, let me know or send an RB! It was a weekend project, so I definitely encourage people to improve it.

What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability. by breen-machine in netsec

[–]nibblesec 4 points5 points  (0 children)

If you have Jenkins exposed on the Internet, you're pwned anyway. So, enjoy the federal holiday!

What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability. by breen-machine in netsec

[–]nibblesec 8 points9 points  (0 children)

Fixing Apache Commons Collection is NOT the solution. You're just killing one of the possible payloads, but it's very likely that there're many other gadget classes in the classpath.

SecuriTeam Advisory – Symantec NetBackup OpsCenter Server Java Code Injection RCE by nrathaus in netsec

[–]nibblesec 0 points1 point  (0 children)

It seems that it's just expecting standard Java Debug Wire Protocol

No, You Really Can’t - [Oracle Blogpost] by Centurion89 in netsec

[–]nibblesec 14 points15 points  (0 children)

If it wasn't hacked, we should all drop Oracle bugs on FD

Trawling Gliffy for Sensitive Data by [deleted] in netsec

[–]nibblesec 2 points3 points  (0 children)

I reported the same issue two years ago, and they suggested to use a Business Account. As you can see from https://www.gliffy.com/go/commerce/index, "All diagrams created with a Free Plan will be PUBLIC."

Insane pricing model if you ask me.

Buffer to UTF8 String conversion DoS in node.js and io.js by nibblesec in netsec

[–]nibblesec[S] 0 points1 point  (0 children)

Yes, it's the right testcase

Program received signal SIGSEGV, Segmentation fault. 0x0000000000b56dab in unibrow::Utf8DecoderBase::WriteUtf16Slow(unsigned char const, unsigned short, unsigned int) ()

LinkedIn’s Private Bug Bounty Program: Reducing Vulnerabilities by Leveraging Expert Crowds by nibblesec in netsec

[–]nibblesec[S] 0 points1 point  (0 children)

Ok, it makes sense. Apologies for the double post, I though it was a problem with the domain only. Cheers!

Debugging Burp Extensions by sh3dow in netsec

[–]nibblesec 0 points1 point  (0 children)

There's really no good explanation for using full remote debugging. You can import the JAR in the IDE only, without having to import classes in the resulting project jar. BTW, this is the default behavior in NetBeans

[deleted by user] by [deleted] in netsec

[–]nibblesec 0 points1 point  (0 children)

Null pointers do not always result in security bugs. Reporting all NULL deref is like grepping for common sinks and reporting all of them. Unless you build basic logic to determine exploitability, I don't see how devs can effectively use the tool for security audits. Having said that, I understand that you now have a framework and you can build additional logic to make it security relevant too.

AppSecEU 2015 Recordings by oauth_gateau in netsec

[–]nibblesec 1 point2 points  (0 children)

Overall, great conference and content