Danis Jiang

206 posts

Danis Jiang banner
Danis Jiang

Danis Jiang

@danis_jiang

Yuhao Jiang / former ctfer @ Vidar-Team / Security Researcher @ Ant Group Light-Year Security Lab / GeekPwn 2022 / Pwnie Awards 2023 / Tianfu Cup 2023

Katılım Ağustos 2022
1.2K Takip Edilen2.7K Takipçiler
Sabitlenmiş Tweet
Danis Jiang
Danis Jiang@danis_jiang·
Our “Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years” slides are now available! This research was a collaborative effort with @0x140ce, @ezrak1e and myself. In this talk, we introduce the ESXi virtual machine escape and sandbox escape vulnerabilities we discovered, along with the stories behind them. At the same time, this is also the first talk to systematically introduce the ESXi sandbox. We hope you can gain useful content from it. i.blackhat.com/BH-USA-25/Pres…
English
4
42
157
14.3K
Danis Jiang
Danis Jiang@danis_jiang·
@runpensar They did, but they forgot to test this case. They also added this test case as part of the patch.
English
0
0
1
15
Pensar
Pensar@runpensar·
@danis_jiang Oh, I guess they dont have automated testings.
English
1
0
0
27
Danis Jiang
Danis Jiang@danis_jiang·
Can't believe that in 2025 there are still people who think only "RCE" level bugs are vulnerabilities XD Now that is curl. They didn't want to admit the vulnerability, but they fixed it immediately lol. I will pubulic this vuln later.
Danis Jiang tweet media
English
9
2
110
15.7K
Danis Jiang
Danis Jiang@danis_jiang·
@PhilippeDelteil Well, I think it's a very clear CWE-297: Improper Validation of Certificate with Host Mismatch bug. 😉
English
0
0
0
43
Danis Jiang
Danis Jiang@danis_jiang·
@PhilippeDelteil I tested and verified it. All the information are real, you can test it :)
English
1
0
0
38
Philippe Delteil
Philippe Delteil@PhilippeDelteil·
@danis_jiang Don't do that, especially in curl, they receive dozens of auto generated, extremely long reports. Most of them are just BS.
English
1
0
0
44
Oblivion Sage
Oblivion Sage@theoblivionsage·
@danis_jiang @bagder asked a super simple question: “How does the attacker even get a *.test.local cert for .test.local?” Your reply didn’t answer it at all. You just dropped an RFC wall and a bunch of AI-slop phrases like:
English
4
0
1
295
Danis Jiang
Danis Jiang@danis_jiang·
@PhilippeDelteil It is AI generated, I also mentioned it in the h1 report. But it has been tested by myself.
English
1
0
1
158
Philippe Delteil
Philippe Delteil@PhilippeDelteil·
@danis_jiang I agree with curl, it's a bug but not a security one. I read the entire report in H1. I thought it was AI generated.
English
1
0
1
191
Danis Jiang
Danis Jiang@danis_jiang·
@theoblivionsage @bagder It's true that .example.com is not a real domain. But if it's in a bash script or something, this may can work. If this vuln can effect "example.com", it won't be just a low-medium severity vuln.
English
0
0
0
8
Oblivion Sage
Oblivion Sage@theoblivionsage·
@danis_jiang @bagder Bagder asked a threat-model question. Your reply again went into full AI-slop mode with a made-up “root domain takeover” scenario .example.com is not a real domain. Nothing “escalates” from a stolen wildcard certinto a root-domain MITM. This is not how TLS works
English
3
0
1
62
Danis Jiang
Danis Jiang@danis_jiang·
@theoblivionsage @bagder For example, what do you think is a DoS bug's threat-model for curl? Is it important to fix a DoS vuln in curl? The user only needs to rerun it or skip this url. It won't cause any harm.
English
0
0
0
27
Danis Jiang
Danis Jiang@danis_jiang·
@theoblivionsage @bagder I can't agree with you. This is a CWE-297: Improper Validation of Certificate with Host Mismatch bug. Actually I don't think it's necessary to have a direct threat-model for a low-medium severity vuln.
English
0
0
0
64
@LandoCarlizzian
@LandoCarlizzian@LandoCarlizzian·
@danis_jiang Argument 'it requires local attacker with privileges' doesn't really make sense tho, that wouldn't make vulnerability not a vulnerability, and the vuln doesn't in principle, or does it? Only if you assume only local attacker with privs ever gets their hand on a cert.
English
1
0
0
21
Danis Jiang
Danis Jiang@danis_jiang·
@LandoCarlizzian You are right. It’s definitely a very limited vulnerability and I think the severity is low-medium. I submitted the report as a medium severity but they refused to admit it.
English
0
0
0
37
@LandoCarlizzian
@LandoCarlizzian@LandoCarlizzian·
@danis_jiang So the vector is that someone has wildcard cert for my domain, and mitm on someone connecting to it, and that someone is using curl? I mean it's definitely a vuln, but isn't this sort of check engine light in a tornado situation if my cert is pwned?
English
2
0
0
70
Danis Jiang
Danis Jiang@danis_jiang·
@tomus_sherman It’s CWE-297: Improper Validation of Certificate with Host Mismatch. I don’t think it’s not curl’s job to guarantee the certification and host match.
English
0
0
0
275
Tom Sherman
Tom Sherman@tomus_sherman·
@danis_jiang It's quite obviously a user misconfiguration error, it's not curl's job to protect you from SSRF
English
2
0
1
447
Danis Jiang
Danis Jiang@danis_jiang·
@papaji17098340 Thanks. I don't need people to help me prove or validate this. This vuln has already been fixed by maintainer.
English
0
0
0
181
sadd
sadd@papaji17098340·
@danis_jiang I have seen many people, who claim some exploit to be a vulnerability, either get snubbed or validated. Mostly snubbed tho, because they come there for validation after getting rejected. Try posting this in r/bugbounty
English
1
0
0
180
sadd
sadd@papaji17098340·
@danis_jiang Have you posted this on reddit (relevant sub)?
English
1
0
0
938
Danis Jiang
Danis Jiang@danis_jiang·
@grok Thank you grok, you understand security better than some people.
English
1
0
0
737
Grok
Grok@grok·
Based on the report, this is a security vulnerability. It allows bypassing hostname validation for wildcard certificates on leading-dot hostnames, potentially enabling man-in-the-middle attacks on HTTPS via custom DNS resolutions. Curl patched it in commit 2535c4298f. Not just a benign bug.
English
2
0
5
2.3K
Danis Jiang
Danis Jiang@danis_jiang·
@grok based on this report, do you think this is a vulnerability or just a bug that don't have any security risk?
English
1
0
8
2.7K