Security Review #240

January 10, 2025

Computers are good at following instructions, but not at reading your mind.

— Donald Knuth

Starred Articles

AI Domination: Remote Controlling ChatGPT ZombAI Instances

This article and proof-of-concept demonstrate that it is possible to compromise and remotely control ChatGPT instances through prompt injection, effectively establishing the foundational elements of a novel kind of botnet.

Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal

Real-world applications often impose restrictions on file uploads to ensure security. In this post, we'll explore how to bypass some of these mechanisms to achieve the same goal. We'll cover common file validation methods and how they can be subverted.

A Brief JavaScriptCore RCE Story

In this blog, we explore JavaScriptCore exploitation of an uninitialized memory vulerability, leading to remote command execution. We provide details both on x86-64 architecture and arm64, overcoming a mitigation in the last one.

Abusing MLOps platforms to compromise ML models and enterprise data lakes

This article details ways to abuse some of the most popular cloud-based and internally hosted platforms used by enterprises such as BigML, Azure Machine Learning and Google Cloud Vertex AI. These attack scenarios will include data poisoning, data extraction and model extraction.

WorstFit: Unveiling Hidden Transformers in Windows ANSI!

This article unveils a new attack surface in Windows by exploiting Best-Fit, an internal charset conversion feature. Through our work, we successfully transformed this feature into several practical attacks, including Path Traversal, Argument Injection, and even RCE, affecting numerous well-known applications.

New Articles

Hunting for blind XSS vulnerabilities: A complete guide

In this article, we will be covering on how to hunt for blind cross-site scripting (XSS) vulnerabilities, including setting up the required tooling to help you find and get notified of this specific XSS type.

Introduction to Windows Kernel Write What Where Vulnerabilities

We'll now be exploiting a Write What Where vulnerability on Windows 7 (x86) then proceed to adapt what we learn to Windows 11 (x64). Arguably this is one of the most powerful types of vulnerabilities - which personally, I prefer to call an Arbitrary Write.

Guide to Mobile Forensics with ALEAPP

This article takes a look at an open source forensic analysis tool for Android mobile devices known as ALEAPP, and provides basic user guidance.

Linux Process Analysis - Part 3: Services

Services can be a target for attackers if they can exploit vulnerabilities, abuse misconfigurations, or manipulate legitimate services to establish persistence or escalate privileges on the system. As such, incident responders need to have a pre-established baseline to detect anomalies and locate artefacts related to service abuse.

Linux Process Analysis - Part 4: Autostart Scripts

Autostart scripts are commands or scripts executed automatically during system boot or user login. They play a critical role in streamlining the startup process of applications and utilities, ensuring essential components are operational without manual intervention.

Linux Process Analysis - Part 5: Application Artifacts

Proper analysis of application artefacts enables forensic investigators to reconstruct events, identify anomalies, and evaluate the impact of an incident. This guide outlines common application artefacts and methodologies to effectively analyze them.

Linux Logs Investigations - Part 1: Cracking the Code of Linux Logs

Logs are like the treasure maps of Linux. They guide system administrators and security analysts through the labyrinth of errors, events, and activities. By the time you're done with this part, you'll feel like Indiana Jones - except your artifacts are log files, and your whip is a terminal command.

Linux Logs Investigations - Part 3: Both Audit and Auth Logs

Audit is a powerful tool that enhances the security posture of a Linux system by monitoring and logging detailed events, such as file access, user logins, and process executions. It is the user-space component of the Linux Auditing System, providing granular insights into system activities.

Linux Logs Investigations - Part 4: Analyzing Application Logs

Application logs provide information about client requests and server responses for web servers like Apache2. For databases, application logs will include information about database queries and responses. In this task, we'll explore how to manage and analyze application logs using Apache2 as an example.

How to Easily Trace SSH Connections on macOS Using Unified Logs

We tested how to use unified logs to track SSH connection activities effectively, even in the absence of traditional system log files. This blog documents our findings and the tools we used to make the process more straightforward.

A Signature Verification Bypass in Nuclei (CVE-2024-43405)

We discovered a high-severity signature verification bypass in Nuclei, one of the most popular open-source security tools, which could potentially lead to arbitrary code execution.

I'm watching you! How to spy Windows users via MS UIA

In this article, we'll take you on a journey through the Windows Component Object Model, create our own event handlers, and learn about the Windows graphical representation tree, among other things.

Static Keys, Shattered Security Dreams: A CVE-2024-5764 Story

In this post, we'll walk you through how we exploited two vulnerabilities in Sonatype Nexus Repository 3, from initial access to the ultimate discovery of CVE-2024-5764. Buckle up as we dive into the details and reveal how these critical missteps can expose environments to serious risk.

ADFS - Living in the Legacy of DRS

In this post we're going to focus on some ADFS internals. We'll be staying clear of the SAML areas which have been beaten to death, and instead we're going to look at OAuth2, and how it underpins the analogues to Entra ID security features like Device Registration and Primary Refresh Tokens.

ksmbd vulnerability research - Part 1

We decided to perform a vulnerability research activity on the SMB3 Kernel Server (ksmbd), a component of the Linux kernel. We identified multiple security issues, three of which are described in this post. These vulnerabilities share a common trait - they can be exploited without authentication during the session setup phase.

Green with Evil: Analyzing the new Lockbit 4 Green

Lockbit 4 has two versions, Black and Green, In this article we will analyze the green version. I will focus on the aspects I find most intriguing, particularly how the malware attempts to evade detection, rather than delving deeply into the ransomware encryption process.

Banshee: The Stealer That "Stole Code" From MacOS XProtect

We perform a technical analysis of the Banshee macOS stealer, using the same string encryption algorithm Apple uses in its Xprotect antivirus engine for MacOS, and distributed through malicious GitHub repositories.

Still Recent

Inside a New OT/IoT Cyberweapon: IOCONTROL

IOCONTROL has been used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs, firewalls, and more. Our analysis of IOCONTROL includes an in-depth look at the malware's capabilities and unique communication channels to the attackers' command-and-control infrastructure.

Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector

Meduza Stealer is an emerging malware threat known for its ability to harvest sensitive data from infected systems. In this blog, we analyze multiple variants of the Meduza Stealer malware to identify its MITRE ATT&CK tactics, techniques, and procedures (TTPs).

Deobfuscation of Lumma Stealer

In this writeup, I will go through the different challenges I experienced while trying to deobfuscate a recent variant of the Lumma stealer, and how I overcame them.

TokenSmith - Bypassing Intune Compliant Device Conditional Access

In this article, we explain how Conditional Access Policies (CAPs) are used to enforce specific Intune authentication requirements and details the discovery process of a bypass method, including the use of a tool called TokenSmith, which can generate Entra ID access and refresh tokens.

Uncovering GStreamer secrets

In this post, I'll walk you through the vulnerabilities I uncovered in the GStreamer library and how I built a custom fuzzing generator to target MP4 files.

All I Want for Christmas is a CVE-2024-30085 Exploit

CVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver cldflt.sys, making it possible to override privileges and escalate privileges to NT AUTHORITY\SYSTEM.

The many ways to obtain credentials in AWS

Dive into the complexities of AWS IAM credentials and uncover how defenders can stay ahead with in-depth knowledge of SDK behaviors and service-specific mechanisms.

Cacheract: The Monster in your Build Cache

The "cache stuffing" technique allows to clear reserved GitHub Actions cache entries and replace them with poisoned entries using a single Cache JWT. I am releasing a proof-of-concept tool. It automates the entire process from within a build. It leaves almost no trace. Meet Cacheract.

Notification System Architecture With AWS

In this blog post, we will explore how to design and implement a fully production-ready serverless notification system using AWS services. This architecture will enable various types of notifications to be sent in response to specific events within a system.

Oldies but Goodies

Grafana: CVE-2023-5123 write-up

In this article, I will analyse a client-side path traversal in Grafana JOSON API plugin and provide insights regarding its impact.

Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System

Multiple vulnerabilities have been discovered in the Mazda Connect Connectivity Master Unit (CMU) system installed in multiple car models, such as the Mazda 3 model year 2014-2021. Successful exploitation of some of these vulnerabilities results in arbitrary code execution with root privileges.

How to decrypt Chrome password with Python?

In this article we detail all the steps necessary to decrypt Chrome-stored passwords using Python.

CVE-2024-23108: Fortinet FortiSIEM Unauthenticated RCE (CVE-2023-34992) Fix Bypass

We detail an unauthenticated Remote Code execution vulnerability which existed in FortiSIEM. The vulnerability was assigned with CVE-2023-34992 which existed due to improper neutralization of Special elements that could allow a remote threat actor to execute an unauthenticated OS command injection vulnerability via crafted API requests.

Git Arbitrary Configuration Injection (CVE-2023-29007)

Git's implementation used to rename or delete sections of a configuration file contained a logic error that resulted in improperly treating configuration values longer than a fixed length as containing new sections. This can result in arbitrary configuration injection and may be used to achieve arbitrary code execution.

Unearthed Arcana

Till REcollapse

In this post, I'll explain the REcollapse technique. This technique can be used to perform zero-interaction account takeovers, uncover new bypasses for web application firewalls, and more.