Ngo Wei Lin

115 posts

Ngo Wei Lin

Ngo Wei Lin

@Creastery

www = web web web · Staff Security Engineer @praetorianlabs · Previously 🌐 Security Researcher @starlabs_sg · Plays CTFs with HATS SG. Opinions are my own.

Singapore 가입일 Mayıs 2012
534 팔로잉1.1K 팔로워
고정된 트윗
Ngo Wei Lin
Ngo Wei Lin@Creastery·
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: starlabs.sg/blog/2024/04-s…
English
5
84
240
40K
Ngo Wei Lin 리트윗함
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code from 1996
English
37
649
1.8K
214.4K
Ngo Wei Lin 리트윗함
GitHub Security Lab
GitHub Security Lab@GHSecurityLab·
🚨 New Blog Alert! 🚨 Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities in Ruby can be exploited and how they can be detected with CodeQL. 🔗 Read the full post: github.blog/2024-06-20-exe… Stay safe and code responsibly! 🛡️💻
English
0
20
46
5K
Ngo Wei Lin 리트윗함
shubs
shubs@infosec_au·
My colleague @hash_kitten and I discovered a full-read SSRF vulnerability in Next.js (CVE-2024-34351). We published our research today on @assetnote's blog: assetnote.io/resources/rese…. Thank you to the Vercel team for a smooth disclosure process.
shubs tweet media
English
17
181
784
95.4K
Ngo Wei Lin 리트윗함
Adnan Khan
Adnan Khan@adnanthekhan·
Here is my deep-dive post on #github Actions cache poisoning. This is a powerful build pipeline lateral movement and privilege escalation technique and I used it to earn several thousand💰in #bugbounty rewards. adnanthekhan.com/2024/05/06/the…
English
3
25
88
6.7K
Ngo Wei Lin 리트윗함
starlabs
starlabs@starlabs_sg·
Send()-ing Myself Belated Christmas Gifts - GitHub's Environment Variables & GHES Shell starlabs.sg/blog/2024/04-s… Read about how one of our talented researchers, @Creastery , found it, exploited it and reported it in a fast and professional manner:
English
1
20
102
12K
Ngo Wei Lin
Ngo Wei Lin@Creastery·
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: starlabs.sg/blog/2024/04-s…
English
5
84
240
40K
Ngo Wei Lin 리트윗함
starlabs
starlabs@starlabs_sg·
Route to Safety: Navigating Router Pitfalls is the swansong from @daniellimws starlabs.sg/blog/2024/rout… We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
English
2
29
60
12.9K
Ngo Wei Lin 리트윗함
Off-By-One Conference
Off-By-One Conference@offbyoneconf·
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits offbyone.sg/cfp/ If you like to talk to us, drop us a line at info@offbyone.sg
Off-By-One Conference tweet media
English
0
18
33
8.4K
Janggggg
Janggggg@testanull·
Just want to announce that I’m officially a part of @dfsec_com today!
English
16
2
120
12.3K
Ngo Wei Lin
Ngo Wei Lin@Creastery·
@adnanthekhan Thanks! Yep, code review. A very unexpected bug with a wild story to share at end April!
English
0
0
2
70
Adnan Khan
Adnan Khan@adnanthekhan·
@Creastery What a cool find! Did you discover it by REing GHES? That’s one heck of a codebase. Can’t wait for a write up!
English
1
0
0
100
Adnan Khan
Adnan Khan@adnanthekhan·
@infernosec @PyTorch @GitHubSecurity @infernosec my gut feeling is that there is some messy code between the ruby side of GitHub and the .NET part of Actions that makes such a change quite tricky at GitHub’s scale. Seems like a no-brainer otherwise.
English
1
0
1
180
Abhishek Arya
Abhishek Arya@infernosec·
This supply chain attack on @PyTorch shows an insecure use of custom/self-hosted github runners and insecure default config ("Require approval for first-time contributors"; anyone can submit a typo fix) gone wrong together. @GitHubSecurity - have you considered changing default to "Require approval for all outside collaborators" for custom runner usecases? - johnstawinski.com/2024/01/11/pla…
English
3
8
25
3.8K
Ngo Wei Lin
Ngo Wei Lin@Creastery·
@joernchen Hey Joern, the current coordinated disclosure date is set at late April 2024. Hope to share more details and insights then!
English
1
0
3
313
Ngo Wei Lin
Ngo Wei Lin@Creastery·
This is one of the most insane bugs I've discovered, but it all happened at a really inopportune time. 😥 Shoutout to all the Hubbers who got involved and had been working tirelessly on this since the Christmas/New Year period! 🙏
GitHub Security@GitHubSecurity

We received a bug bounty report of a vulnerability which, if exploited, allowed access to credentials within a production container. We have patched GitHub.com and rotated all affected credentials, and patches for GHES are available today. github.blog/2024-01-16-rot…

English
0
0
57
5.4K
Ngo Wei Lin
Ngo Wei Lin@Creastery·
@albinowax There is still one more duplicate entry for "Compromising F5 BIGIP with Request Smuggling", but other than that, I think you got them all.
English
0
0
1
138