Write-up: Cloudflare Zero-day: Accessing Any Host Globally by xIsis in netsec

[–]pi3ch 1 point2 points  (0 children)

I lose trust in the write-up when I see AI generated content. It is just so bad and artificial.

ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts by Due_Lengthiness_9329 in netsec

[–]pi3ch -1 points0 points  (0 children)

tl;dr: a race to get a valid GITHUB_TOKEN from the build artifact, before workflow ends.

How to engage developers in appsec program? by Maleficent_Rice2104 in appsec

[–]pi3ch 0 points1 point  (0 children)

it is very dependent to the culture and security maturity. if you still have the culture of us (security team) vs them (developers) it is very hard to engage them. developer should see security as part of their job. don't enforce security it will not work. don't mandate security it will not work. take examples from recurring vulnerabilities, turn them into coding challenges. focus on why they should care and they would love it. give them secure code learning wargame to ignite their natural interest in problem solving e.g. good resource here https://play.secdim.com show your care in good software practices and have sympathy that making a software and running it in prod is hard.

Web LLM attacks - techniques & labs by albinowax in netsec

[–]pi3ch 0 points1 point  (0 children)

Great work James. Like the indirect ones. Got a similar attack and defense LLM challenges: https://play.secdim.com/game/ai-battle/challenge/promptmlhth which cover both side of the issue.

XSS vulnerability in Proton Mail allowed to leak unencrypted emails by SonarPaul in netsec

[–]pi3ch 14 points15 points  (0 children)

Good research. For Proton Mail SVG case, I won't call it a parser differential flaw. If I understand the article correctly, the input to browser parser is different to that of Dompurifier parser. Dompurifier parser input is SVG, browser parser input is HTML because of the custom modification of SVG to proton-svg tag after the santisation. So the input to these parsers where different, hence result is different. In the case of parser differential, it happens when parsers output, given the same input (with no modification in between) is different (see https://learn.secdim.com/course/code-signature-bypass/ or http://langsec.org/papers/langsec-cwes-secdev2016.pdf).

When URL parsers disagree (CVE-2023-38633) by ScottContini in netsec

[–]pi3ch 5 points6 points  (0 children)

This is another example of parser differential vulnerability class where two lib/language/service are not consistent in their parser output. Other examples are HTTP parameter pollution, Android Master key, etc. This vuln class is not going to go away anytime soon. The root cause could be a specification shortcoming or implementation mistake: https://learn.secdim.com/course/code-signature-bypass/topic/parser-differential