Mateusz Olejarka

1.3K posts

Mateusz Olejarka

Mateusz Olejarka

@molejarka

OSWE, HTTP requests forger, Head of Web Security @SecuRingPL

Katılım Ocak 2015
267 Takip Edilen769 Takipçiler
Lukasz Jachowicz
Lukasz Jachowicz@ljachowicz·
Spoiler. Więcej informacji - wkrótce.
Lukasz Jachowicz tweet media
Polski
2
0
1
156
Mateusz Olejarka retweetledi
Nagli
Nagli@galnagli·
🚨The new unauthenticated RCE affecting Aviatrix Controllers (CVE-2024-50603) is the real deal - with a single POST request 🫠 and a super trivial exploit, it takes less than 30 seconds to: 1. Collect all Aviatrix Controllers over the internet 2. Validate exploitability with nuclei template that fetches /etc/passwd 3. Fetch IMDSv2 token 4. Extract AWS Credentials 5. GG If your company uses Aviatrix Controller I'd advise patching immediately & assume compromise since January 7th. Original blog: securing.pl/en/cve-2024-50… @wiz_io exploitation in the wild: wiz.io/blog/wiz-resea… POC for extracting IMDSv2 token & AWS Keys - Stay Safe & until the next one 🫡
Nagli tweet mediaNagli tweet mediaNagli tweet mediaNagli tweet media
English
1
41
288
20.1K
Mateusz Olejarka retweetledi
CISA Cyber
CISA Cyber@CISACyber·
🛡️ We added #Aviatrix Controller OS command injection vulnerability CVE-2024-50603 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
CISA Cyber tweet media
English
3
29
59
7.5K
Tomasz Onyszko
Tomasz Onyszko@tonyszko·
It was easy guess even with a simple, anecdotal poll among users. Knowing enterprise space, you know that (almost) nobody will drop such purchase on a minor hickup. Too much of credits, procurement and compliance at stake. Also … choosing alternative doesn’t address the risk and costs 💰
Tomasz Onyszko tweet media
English
1
0
2
458
Mateusz Olejarka retweetledi
Oh My Hack
Oh My Hack@OMHconf·
Uwierzytelnienie użytkownika to sprawa trudna. Ostatnie lata przyniosły nam wysyp i coraz większą adopcję rozwiązań Single Sign On. 🔒 To i dobrze, i źle. Dlaczego? O tym dokładniej opowie Mateusz @molejarka! Jego wykład zobaczycie już 26 listopada 🔜 omhconf.pl
Oh My Hack tweet media
Polski
0
2
4
1.7K
Black Duck
Black Duck@BlackDuck_SW·
🚨 #BigNews: New Black Duck research finds majority of #DevSecOps teams are not confident about securing AI-Generated code in their latest publication of the "Global State of DevSecOps 2024". Read the full press release here: bit.ly/3zYata7
Black Duck tweet media
English
1
0
0
236
Mateusz Olejarka
Mateusz Olejarka@molejarka·
@prywatnik Imho rozwiązano już dawno 🙃. Programisto pisz bezpiecznie 🤷‍♂️😜
Polski
0
0
0
44
Łukasz Olejnik
Łukasz Olejnik@prywatnik·
Wreszcie rozwiązano problem bezpieczeństwa webowego.
Łukasz Olejnik tweet media
Polski
1
0
1
752
Mateusz Olejarka
Mateusz Olejarka@molejarka·
@nnwakelam Pentest may be dull, but you get stable income, no bad triage experience and no discussion about payout amount, you get money when you tested the scope and it does not matter when you found something or not 😎😜
English
0
0
0
118
Mateusz Olejarka
Mateusz Olejarka@molejarka·
@nnwakelam I stopped doing bug bounty some time ago. For me personally it was few cases, when 1. I had to wait a long long time for triage 2. I hit P1 but got money as for P2 3. I got silent fix and duplicate/unable to reproduce. 🤷‍♂️
English
1
0
1
686
Mateusz Olejarka
Mateusz Olejarka@molejarka·
@naugtur Sure, most apps do have an existing session assuming that the phone unlock is enough, some apps require auth anyway, it depends what app you write
English
1
0
0
20
Naugtur 💔🇺🇦
Naugtur 💔🇺🇦@naugtur·
@molejarka In most cases if they have your unlocked phone there's sessions there all over the place. I could always add a second factor later 😂
English
1
0
0
33
Naugtur 💔🇺🇦
Naugtur 💔🇺🇦@naugtur·
Today's shower thought: Use TOTP tokens (2FA apps) for the first and only factor in authentication. Somebody tell me why it's a bad idea 🫣
English
3
0
1
194
Mateusz Olejarka
Mateusz Olejarka@molejarka·
@naugtur Assuming a low probability event that someone has your phone unlocked they may log into the app 🧐🤷‍♂️
English
1
0
0
19
Naugtur 💔🇺🇦
Naugtur 💔🇺🇦@naugtur·
And the starting secret is sha512(username+supersecret_salt) so my auth is stateless and doesn't need a database or registration 🤣
English
3
0
1
137
Mateusz Olejarka retweetledi
taoki
taoki@justalexoki·
wait serverless applications run on WHAT??
English
122
244
4.5K
345.3K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
anyone? $2b$10$1xzN8GcLBMPi7FuwiS5fX.9vV13g5HiJW4sexWYiaLwJWI.rrTmIC $2b$10$dDyqndGKvy.1LlWIxWH.Z.ZvEQ6EXn.Q.KPhuxtnWaonl7uxB9vWe $2b$10$4Ozc9niyNKc8fAMeX9ITZuR9/NPYdLK7aqisitT/8yKODnCwBh.ma $2b$10$rWm3RrquC8ttmwRQJnW1ieQkuRBgE/O9k9nianIkFiZtreeotMBnO
4
0
4
2.8K
Mateusz Olejarka retweetledi
Securing
Securing@SecuRingPL·
Ever wondered how experts tackle real-world security issues? 💡 Join us at @CONFidenceConf and bridge the gap between theory and practice!
Securing tweet mediaSecuring tweet mediaSecuring tweet media
English
0
3
6
672
confidenceconf
confidenceconf@CONFidenceConf·
Authentication was always hard. Mateusz @molejarka will present recent examples of security problems related to OAuth and OpenID Connect and issues in GCP and Azure. 📣 “CAse study of Recently DIscovered vulNerAbiLities in Single sIgn oN mechaniSms” 🎫 confidence-conference.org
confidenceconf tweet media
English
2
0
7
2.2K