Hacking, AppSec, and Bug Bounty newsletter
2018-05-03 | Windows host compute service shim RCE, Grep by b0rk, and MS EDGE - Address bar spoof
Thursday, May 3
Programming note: there will be no Zero Daily published tomorrow, see you all on Monday and enjoy the weekend!
Windows Host Compute Service Shim remote code execution vulnerability discovered by Michael Hanselmann. Here’s Microsoft’s advisory notes.
NR Internal_API call allows me to read the events/violations/policies/messages of ANY New Relic account (AND pull data from infrastructure) [10 upvotes] - $1,000 bounty for this report to New Relic by @jon_bottarini.
DoS through cache poisoning using invalid HTTP parameters [14 upvotes] - $500 bounty for this report to Greenhouse.io by @irvinlim.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
Welp, it turns out the #Meltdown patches for Windows 10 had a fatal flaw: calling NtCallEnclave returned back to user space with the full kernel page table directory, completely undermining the mitigation. This is now patched on RS4 but not earlier builds -- no backport?? - @aionescu
OTHER ARTICLES WE’RE READING
MS Edge - Address Bar Spoof PoC by Manual Caballero
Grep by @b0rk
A look at Privacy Shield and GDPR by Inside Cybersecurity
Employees posting company passwords on public Trello boards.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: firstname.lastname@example.org
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The best in a class of one.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.