Hacking, AppSec, and Bug Bounty newsletter
2018-01-22 | Crypto miners are everywhere, Orange Tsai’s GIF exploit, and Grawler
Monday, January 22
Reflected XSS vulnerability in Database name field on installation screen [16 upvotes] - no bounty for this report to concrete5 by @sts.
Information disclosure on paycard.rapida.ru [12 upvotes] - $100 bounty for this report to QIWI by @tikoo_sahil.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
Orange Tsai’s harmful GIF exploit: PHP CVE-2018-5711
SEC tells funds to “pump the brakes” on crypto holdings
Less than 10% of Gmail users have enabled two-factor authentication
Long live playful exploration. #NotAnotherKaliTutorial
HACKING TOOLS AND TIPS
Wapiti: open source python scanner + fuzzer
Grawler: recursively walks object trees in a git database searching for "deleted" passwords, secrets, keys, and other sensitive information
@jobertabma: Hackers, did you find a SQL injection in an ORDER BY clause and you're unable to guess the column names? Use CASE WHEN <query> THEN RAND() ELSE 1 END to extract data. It'll randomize the order when <query> evaluates to true and remain static when false.
@bonsaiviking: #Nmap comes with 586 #NSE scripts. 148 of them are default (-sC) or version (-sV) scripts. The rest (438) have to be invoked directly or by category, so many folks don't use them. Here are my top 18 NSE scripts you should run in 2018: #DiscoveringNSE
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The bug relied on the type conversion from int to unsigned char. As you can see:
If GetDataBlock_ return -1, scd->done in line 400 will set to True, and stop the while-loop. But it will never be executed because the definition of count is unsigned char, it’s always be a positive from 0 to 255. So the result is, one single GIF can make an infinite loop and exhausted the server resource.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.