25 Followers
63 Following
71 Posts
🧑‍💻 finding flags at @ FluxFingers
🔏 finding bugs @cure53
he/him
Websitehttps://realansgar.dev
GitHubhttps://github.com/realansgar
@rebane2001 1 like = 1 certbot deployment

I started playing with @AsahiLinux on my laptop a few weeks ago and ended up finding a bunch of RCE's on the software forge where all @fedora packages and remixes are developed!

Huge kudos to the maintainers for this new release (https://pagure.io/pagure/blob/6b06ac585529c3087364a5ebe4fb9d7c20e3c872/f/doc/changelog.rst)—can't wait to share the details in a blog post one of these days.

Next stop, the kernel.org infrastructure? 

Tree - pagure - Pagure.io

@Tutanota I chose Tuta because it is a private email solution that has a good security posture and German jurisdiction. Also it is quite cheap 😌​
Critical vulnerabilities in pfSense firewall: RCE via XSS and Command Injection!
Find out how SonarCloud discovered these vulnerabilities in our newest blog post:
https://www.sonarsource.com/blog/pfsense-vulnerabilities-sonarcloud?utm_medium=social&utm_source=mastodon&utm_campaign=&utm_content=blog-pfsense-vulnerabilities-sonarcloud-231212-p1&utm_term=ww_en_all_x
(CVE-2023-42325, CVE-2023-42326, CVE-2023-42327)
#vulnerability #pfSense #cleancode
pfSense Security: Sensing Code Vulnerabilities with SonarCloud

Our Clean Code solution SonarCloud discovered multiple vulnerabilities leading to remote code execution on pfSense CE 2.7.0. Let's see how SonarCloud found them and how it can keep your code clean.

Stolen with Style: Dive into our technical writeup of a complex Cross-Site Scripting vulnerability we discovered in Proton Mail!

Be ready for a story about parser differentials, sandbox bypasses, and CSS data exfiltration:

https://www.sonarsource.com/blog/code-vulnerabilities-leak-emails-in-proton-mail/?utm_source=mastodon&utm_medium=social&utm_campaign=protonmail&utm_content=security&utm_term=mofu

#security #appsec #cleancode

Code Vulnerabilities Put Proton Mails at Risk

The Sonar Research team discovered critical code vulnerabilities in Proton Mail, Skiff and Tutanota. This post covers the technical details of the XSS vulnerability in Proton Mail.

We've just published a new Web Security Academy topic on GraphQL! Learn how to abuse introspection, discover hidden data, bypass rate-limits, and trigger CSRF with this popular API technology.
https://portswigger.net/web-security/graphql
Testing GraphQL APIs | Web Security Academy

In this section we'll look at how to test GraphQL APIs. GraphQL vulnerabilities generally arise due to implementation and design flaws. For example, the ...

“[T]he app starts to figure out ‘real IP address’ by doing a request to both google and bing with query ‘what+is+my+ip’.”

Afterwards, the app “does a couple of requests to 2 different config files stored in personal google drive account of the app creator.”

Whoever wrote this takes a very… straightforward approach to programming!

https://lecromee.github.io/posts/swing_vpn_ddosing_sites/

Swing VPN app is a DDOS botnet

tldr: Swing VPN is using its user base to DDOS sites using its users as a an attack botnet. Introduction It all started with a friend of mine complaining that his phone was doing a request to a specific app every few seconds. Initial assumption was that the phone was infected with a virus but a 2 minute investigation showed that all requests went from ‘Swing VPN’ app which were legitimately installed on the phone as VPN service.

@mialikescoffee @Tutanota in my experience, people can write to [email protected] and it gets delivered. So the address limit is more relevant for sending mail.
We know it's hard to get a secure messaging app right. But this just keeps getting worse. Somehow they check all the "what's wrong with modern app dev" boxes, including confidently overselling (lying about) what the app actually does
https://crnkovic.dev/testing-converso/
Testing a new encrypted messaging app's extraordinary claims

How I accidentally breached a nonexistent database and found every private key in a 'state-of-the-art' encrypted messenger called Converso.

crnkovic.dev

"(W)hat we are witnessing is the wealthiest companies in history (Microsoft, Apple, Google, Meta, Amazon …) unilaterally seizing the sum total of human knowledge that exists in digital, scrapable form and walling it off inside proprietary products, many of which will take direct aim at the humans whose lifetime of labor trained the machines without giving permission or consent."

https://www.theguardian.com/commentisfree/2023/may/08/ai-machines-hallucinating-naomi-klein

AI machines aren’t ‘hallucinating’. But their makers are

Tech CEOs want us to believe that generative AI will benefit humanity. They are kidding themselves

The Guardian