If the target sets X-Frame-Options: DENY, you can’t iframe it to abuse session context. But @slonser_ points out a slick workaround: use the fetchLater() API to schedule deferred requests that execute even after the page is closed or navigated away from.
The article is out ! 🤟
Title: We hacked Google’s A.I Gemini and leaked its source code (at least some part)
We worked on this with @Rhynorater and I'm so excited this is finally out ;)
Link in the thread 🧵
My blog post about several findings in Dynamics 365 Business Central. I tried writing in a .NET primer style for code audit beginners.
frycos.github.io/vulns4free/202…
The first batch of #H165 winners are here! On behalf of the HackerOne and @salesforce teams, thank you for your hard work. 💪
1st Place: arneswinner
3rd Place: ngocdh
Eliminator: matanber
Exterminators: shubs, ziot, nahamsec, ryotak
Most Valuable Hacker: arneswinner
I can't believe so many people are sleeping on this research: code-white.com/blog/leaking-o…
Code White again smashes it out of the park with their meticulous knowledge of software stacks. I have so much respect for them publishing this.
Nice work, @mwulftange!
Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k!
blog.projectdiscovery.io/hello-lucee-le…
Early this morning, we alerted our customers to a new Ivanti SSRF vulnerability that our research team discovered when reverse engineering Ivanti’s latest patch.
We decided to hold off on releasing this blog post publicly and support our customers in their remediation.
Since this finding has been publicly posted by another party, we are also releasing our research to help add some more color.
assetnote.io/resources/rese…
Exploiting ASP .NET TemplateParser to get RCE in Sitecore (CVE-2023-35813) and SharePoint (CVE-2023-33160) by @mwulftange in two parts: part 1 at code-white.com/blog/exploitin… is live now and part 2 will follow in a few days...stay tuned!
Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances:
http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80
Check images for response difference between 169.254.169.254 and the above payload I shared 🔥
#bugbounty#infosec#waf
RE Tip. If you want to decrypt obfuscated .NET strings, just call them from Powershell. E.g. this is xWorm config decryption.
File: virustotal.com/gui/file/cb0a5…
4/ 🔥 Did you know `<!ENTITY x SYSTEM "//domain/">` in Java triggers a FTP request, not HTTP ? The WAF didn't. I leveraged this oversight for successful data exfiltration.