Jake Miller

437 posts

Jake Miller banner
Jake Miller

Jake Miller

@theBumbleSec

Web Security Researcher | h2c smuggling, JSON Interop vulns, RMIScout, GadgetProbe, Server-side Spreadsheet Injection | AppSec @BrexHQ; formerly @BishopFox

Katılım Ekim 2012
381 Takip Edilen2.3K Takipçiler
Jake Miller retweetledi
MOGWAI LABS GmbH
MOGWAI LABS GmbH@mogwailabs·
It seems that there is a lot confusion about the log4j JNDI injection vulnerability (CVE 2021-44228). In our latest blog post we provide additional background fundamentals about JNDI and JNDI exploitation (and a lot of links): mogwailabs.de/en/blog/2021/1…
English
3
38
114
0
DARC_4CZ
DARC_4CZ@projectzerodays·
@theBumbleSec the spreadsheet injection refs in your bio… could I possible take a look at your research? Links? Info? DM me.
English
1
0
0
0
Jake Miller retweetledi
Pew
Pew@TheGrandPew·
Found another jndi bypass like 🟠's groovy bypass using org.yaml.snakeyaml.Yaml. Heres a controller for rouge-jdni to add it to your arsenal gist.github.com/TheGrandPew/74….
English
0
35
86
0
Jake Miller
Jake Miller@theBumbleSec·
Excited to share that I have just started a new position on the AppSec team @BrexHQ! Looking forward to being a part of their awesome team :)
English
2
0
15
0
Jake Miller retweetledi
Dominic
Dominic@dee__see·
I used Radamsa to fuzz and find an inconsistency between 2 NodeJS URL parsers and bypass host whitelisting in Kibana webhooks. The impact was low here but the parser issue can probably cause some trouble in other Node code bases. Read more details 👇 blog.deesee.xyz/fuzzing/securi…
English
2
49
121
0
Jake Miller retweetledi
Mark Manning
Mark Manning@antitree·
Istio vulnerability with an 8.2 CVSS. They're calling it a 0day. Also a lesson in JWT validation mistakes. > If a JWT token is presented with an issuer that does not match the issuer field specified in JwtProvider, then the request is mistakenly accepted groups.google.com/g/envoy-securi…
English
1
35
101
0
Jake Miller
Jake Miller@theBumbleSec·
@h3xstream @nst021 Thank you for letting me know! Love the depth of this piece. It also provides coverage for languages that I skipped like Swift, Perl, Obj-C, and Lua. Added a link and shout out in the Takeaways section :)
English
0
0
2
0
Jake Miller
Jake Miller@theBumbleSec·
@nlohmann The trials included: 1) attempting to induce duplicate keys through truncation 2) fuzzing Unicode codepoints/raw/transforms 3) using unofficial JSON grammar 4) edge-case numbers 5) adding small quirks/errors: stray quotes or backslashes, odd whitespace. Hope that helps! (2/2)
English
0
0
0
0
Jake Miller
Jake Miller@theBumbleSec·
@nlohmann Hey Niels! Nice to meet you :) During my tests, nlohmann/json had behavior consistent with JSON parsing "norms" and the spec. Notably, it made excellent use of exceptions! I'd be happy to provide more context on the test cases. (1/2)
English
1
0
0
0
Jake Miller
Jake Miller@theBumbleSec·
Just when you thought JSON was the one thing you could trust. My latest research on JSON interoperability vulnerabilities highlights the risks of inconsistent parser behavior (40+ parsers) and attacks to bypass business logic in microservice architectures. labs.bishopfox.com/tech-blog/an-e…
English
17
510
1.1K
0