Vulnerabilities (Page 14)

Unauthorized access to organization secrets in GitHub

An information disclosure in GitHub through the Security Advisories feature.GitHub allows maintainers to draft public advisories, and in doing so you can create a temporary private fork to collaborate on and review fixes without disclosing them publicly…

 

HubSpot Full Account Takeover in Bug Bounty

A lot of wrong turns, eventually leading to some parameter brute forcing and the discovery of an href param when submitting a Forgot Password request.The href value would be used to craft the forgot password link with the actual token appended to it that is reflected in the Forgot Password email…

 

Exploiting a CRLF Injection in the `Location` header

A nice use of the a CRLF Injection to exploit a seemingly unexploitable injection because the browser wouldn’t render the page when a Location header was present.Basically just used the CRLF injection ot inject a Connection: Location header, telling the proxy to treat the Location header as a hop-by-hop header and drop it before passing it on to the end-user…

 

CorePlague: Severe Vulnerabilities in Jenkins Server Lead to RCE

The XSS here is fairly basic, attacker controlled data reflected without sanitization, whats a bit more interesting is the input source, plugin metadata processed by the global Jenkin’s Update Center.There is a bit of a process to getting plugins listed in the Update Center, submitted a PR and the first plugin needs to be manually approved, though the authors note that this is mostly a procedural thing…

 

Megafeis-palm: Exploiting Vulnerabilities to Open Bluetooth SmartLocks

A long, fairly beginner friendly post about attacking a Bluetooth lock, there is a lot of process information here as it was an intern’s research project. What the vulnerability comes down to though is a lack of any real authoization checking instead only validating the integrity (poorly!) of the request and trusting the app did all the heavy lifting.

 

ImageMagick: The hidden vulnerability behind your online images

In resizing a PNG, in a textual chunk you have keywords and a text string as a value, if the keyword profile is used, imagemagick will try to read the associated filename (the text value for the keyword) and will load the content of the file (if it exists) into the resultant image. So in cases where a user uploaded image is resized or processed in some way by imagemagick, it may be possible to leak file content in the resulting image.