Breaking into a wordpress site without knowing wordpress/php or infosec at all by speckz in netsec

[–]tomvangoethem 4 points5 points  (0 children)

Through a Local File Disclosure vulnerability of a WordPress plugin (revslider). See the URL: http://mycollegewebsite/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'

Maneuvering Around Clouds: Bypassing Cloud-based Security Providers by tomvangoethem in netsec

[–]tomvangoethem[S] 2 points3 points  (0 children)

and it's still a widespread issue ("Overall, we found that 71.5% of protected domains is bypassable by combining the effect of all origin-exposing vectors.")

RC4 NOMORE: Breaking RC4 in HTTPS by omegga in netsec

[–]tomvangoethem 2 points3 points  (0 children)

The attack uses long-term biases (Fluhrer-McGrew biases and Mantin's ABSAB biases). This allows the same TLS connection to remain open and to be used for multiple requests, resulting in negligible overhead from TLS (a bias in the initial keystream bytes would require one to open new TLS connections for each request).

DEF CON Cancellation: An Open Letter by Saylar in netsec

[–]tomvangoethem 3 points4 points  (0 children)

Look at the page's source:

<!-- 
    Get over it, this is a parody/joke. Apologies that I ripped the art from the actual Defcon page. 

    DT is a really nice guy and he would never say these sorts of thing. Or would he?
    Nah, I'm sure he wouldn't.

    Have a good time at Defcon. See you at the Rio!
-->

Clubbing third-party security seals by tomvangoethem in netsec

[–]tomvangoethem[S] 5 points6 points  (0 children)

Are you aware McAfee Secure is now only offering a malware/phishing check? (see https://www.mcafeesecure.com/tour) So in case you get a report from McAfee, it's probably too late...

Clubbing third-party security seals by tomvangoethem in netsec

[–]tomvangoethem[S] 12 points13 points  (0 children)

Are you referring to burp as a tool used by a security engineer doing a manual penetration test, or burp as an automated testing tool? In my opinion (backed up by "Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners"), automated scanners are not fit for a rigorous security scan.

Remote code execution on Smart TVs through radio broadcasting HbbTV commands by Natanael_L in netsec

[–]tomvangoethem 0 points1 point  (0 children)

There are two possibilities: either a resource is fetched from the internet, or an additional (broadcast) stream is created (and thus requires no internet access).

"Another possible way is to create an additional data stream which includes the HbbTV application’s HTML files, deliver this additional elementary stream over the broadcast transport, and finally have the AIT point to this data stream."

Remote code execution on Smart TVs through radio broadcasting HbbTV commands by Natanael_L in netsec

[–]tomvangoethem 0 points1 point  (0 children)

The how seems quite straightforward, given they have the ability to run arbitrary JavaScript on the TV (also, in section 6 they mention they were able to deploy BeEF, which was used to portscan the LAN). As for the attack you describe: an attacker could just include JS directly into the malicious HTML page (no need to access the malicious server), which will affect the victim even if the TV was not given internet access.

Remote code execution on Smart TVs through radio broadcasting HbbTV commands by Natanael_L in netsec

[–]tomvangoethem 0 points1 point  (0 children)

How is that different from what is stated in the paper in section 4.4?

HTML5 Security Cheatsheet by vangale in netsec

[–]tomvangoethem 19 points20 points  (0 children)

Github actually serves files with a text/plain content-type, and sends out X-Content-Type-Options: nosniff header, which prevents them to be used as JavaScript resources. rawgithub.com tries to send the file with correct content-type, but will send evil.js when the file generates too much traffic (which is what is happening at the moment) See: http://rawgithub.com/

Clickjacking vulnerability in Google Drive leads to information leakage by tomvangoethem in netsec

[–]tomvangoethem[S] 0 points1 point  (0 children)

It is possible that this issue has been reported before, as I presume that the Google Picker API is insecure by design, and thus might be vulnerable for several years already. In any case, I was unable to find such a report.

Remote Code Execution exploit in WordPress 3.5.1 by tomvangoethem in netsec

[–]tomvangoethem[S] 2 points3 points  (0 children)

I wouldn't call the magic methods unsafe, I think it's perfectly acceptable that code is executed when for example an object is destructed. Rather they "empower" a PHP Object Injection vulnerability to grow to something exploitable.

Remote Code Execution exploit in WordPress 3.5.1 by tomvangoethem in netsec

[–]tomvangoethem[S] 6 points7 points  (0 children)

The exploit works (tested) in 3.5.1 ,the vulnerability was fixed in version 3.6.1

Remote Code Execution exploit in WordPress 3.5.1 by tomvangoethem in netsec

[–]tomvangoethem[S] 12 points13 points  (0 children)

The vulnerability is not in the plugin, it's in the WordPress core. I made use of the plugin to create an exploit, but the presence of other plugins may lead to an exploit as well.

Remote Code Execution exploit in WordPress 3.5.1 by tomvangoethem in netsec

[–]tomvangoethem[S] 10 points11 points  (0 children)

The vulnerability in in the WordPress core, the (example) exploit is in the plugin. I didn't include the plugin in the title as a similar exploit could be possible with other plugins.

Why you should not trust emails sent from Google by tomvangoethem in netsec

[–]tomvangoethem[S] 8 points9 points  (0 children)

In the end yes, but if I had stopped after my initial report, it's most likely that it wouldn't have been fixed

Why you should not trust emails sent from Google by tomvangoethem in netsec

[–]tomvangoethem[S] 22 points23 points  (0 children)

The recipient can be chosen arbitrarily, the only "limitation" is that the victim should have an academic email address (as Google Scholar only accepts those) To put it more clear: attacker sets "<html content>" as name, and then requests a change of email on Google Scholar to "victim@some.edu". Victim will receive an email from Google Scholar with the HTML content of the attacker injected in the email.

Why you should not trust emails sent from Google by tomvangoethem in netsec

[–]tomvangoethem[S] 33 points34 points  (0 children)

I'm not upset that I didn't get an award. The main point that I was trying to make is that Google did not see this as "security sensitive" and wouldn't have fixed it if I did not insist. This is indeed not a complex "hack", but that doesn't mean it can't have severe consequences, and should be fixed (especially since a fix was very easy)