4 Followers
44 Following
72 Posts
Great analysis of CVE-2024-38063 (IPv6 RCE): https://x.com/f4rmpoet/status/1825472703223992323
Seems limited to DoS “only”.
farmpoet (@f4rmpoet) on X

It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. 🧵

X (formerly Twitter)
Has anyone a good procedure to identify the use of cdn.polyfill.io ? (source code analysis, web scanner, ...)
#polyfill
CVSS v4 consistency survey: if you have experience in analysing vulnerabillities with CVSS score (any version), please try to answer this survey from the IT Security Infrastructures Lab of the Friedrich-Alexander University (FAU) in Germany.
https://user-surveys.cs.fau.de/index.php?r=survey/index&sid=361794
CVSS v4 Survey

New Ivanti Sentry vulnerability: https://www.ivanti.com/blog/security-update-for-ivanti-standalone-sentry
(high CVSS but not that dramatic, requires TLS client certificates and "adjacent" network)
#ivanti #vulnerability
Security Update for Ivanti Standalone Sentry | Ivanti

As part of the continued hardening of our solutions, the Ivanti team in partnership with third-party researchers identified a new vulnerability.

Given just how much "enshittification" of internet companies we've seen of late, I put together a list of 7 basic rules for internet CEOs who DON'T want to enshittify their companies: https://www.techdirt.com/2023/06/21/seven-rules-for-internet-ceos-to-avoid-enshittification/
Seven Rules For Internet CEOs To Avoid Enshittification

It seems that we’ve had a rash of formerly loved internet services going down the enshittification curve. As coined (brilliantly) by Cory Doctorow, enshittification is the process by which a compan…

Techdirt

Interesting research by David Bozzini, an antropologist at the University of Fribourg, Switzerland, about the history of vulnerability disclosure, from first (ethical) hacker to modern bug bounty programs:

"My research focuses on the defense mechanism of vulnerability disclosure, which has become immensely valuable to the digital tech industry and beyond. This paper addresses the history of vulnerability disclosure and the emergence of the defensive market that has developed alongside the offensive market In fact, the defensive market for vulnerability information is a recent model of vulnerability disclosure organized in the form of bug bounties programs. Bug bounties are initiatives managed by companies or organizations looking for information on their own vulnerabilities through which they pay individuals—ethical hackers—to uncover bugs in their systems and, in turn, improve the security of their products and services. In this paper, I analyze the historical processes that have transformed models of vulnerability disclosure over the years and have given rise to a defensive market that has monetized disclosure, turned ethical hacking into labor, and made information on vulnerabilities a commodity."

https://hal.science/hal-04068476

#vulnerabilitydisclosure #bugbounty #history #research #markets

How Vulnerabilities Became Commodities. The Political Economy of Ethical Hacking (1990-2020).

My research focuses on the defense mechanism of vulnerability disclosure, which has become immensely valuable to the digital tech industry and beyond. This paper addresses the history of vulnerability disclosure and the emergence of the defensive market that has developed alongside the offensive market In fact, the defensive market for vulnerability information is a recent model of vulnerability disclosure organized in the form of bug bounties programs. Bug bounties are initiatives managed by companies or organizations looking for information on their own vulnerabilities through which they pay individuals—ethical hackers—to uncover bugs in their systems and, in turn, improve the security of their products and services. In this paper, I analyze the historical processes that have transformed models of vulnerability disclosure over the years and have given rise to a defensive market that has monetized disclosure, turned ethical hacking into labor, and made information on vulnerabilities a commodity.

@ProxyNotShell exploit public https://github.com/testanull/ProxyNotShell-PoC
it does not attempt (yet) to bypass URL filtering rules or uses alternate encoding.
GitHub - testanull/ProxyNotShell-PoC

Contribute to testanull/ProxyNotShell-PoC development by creating an account on GitHub.

GitHub