Not all SSRF vulnerabilities are equal, a common mitigation is to limit the locations that can be accessed; in the case of WebSphere Portal, this is exactly what was found, yet it could still be exploited.
nodeIntegration being enabled).
Polygon places the blame for this bug on not checking that the
from address in a transfer actually has the balance to cover the transfer in the first-place.While I don’t doubt that as a core issue it feels like that may only be part of the issue, the other part being a lack of error checking, or perhaps improper error handling…
tl;dr There are two key issues with Flickr’s use of AWS Cognito for their authentication, first, is that only the
sub attribute is guaranteed to be unique and should be used to identify users, second is that the
access_token provided can be used to modify user attributes. These issues can be chained to modify the
email attribute (which is the attribute Flickr is using to identify accounts) and have one Cognito account map to another user’s Flickr account.
Basic idea here is that you could mount unintended paths due to embeding null-bytes in acceptable mount and generally improper handling of null-bytes within a mount source.While Go does not provide any special handling for strings containing null bytes, the
send_mountsources written in C just iterates over the provided message mounting every null-terminated substring and passes the resultant fds to the child…
This is straight forward, yet subtle bug, basically taking a reference to a file while it is actively being deleted leading to a use after free despite holding onto a reference.
This is a interesting primitive, an unsigned 32bit integer can mistakenly be kept unsigned after it is supposedly converted to a signed 64bit integer and passed in somewhere expecting a signed value.
There is an argument injection within the
ms-officemd URI scheme (available by default on WIndows 10 and 11) used by MS Office applications to launch other Office apps. By targeting the MS Teams Electron application one could leverage the
--gpu-launcher argument for arbitrary command injection without any hassle.
Server-Side Request Forgery (SSRF) in the AppSheet product, an acquisition by Google which is a “no-code” application generator.One feature is that a web-hook can be executed in respond to supported events…