Jens Müller

228 posts

Jens Müller banner
Jens Müller

Jens Müller

@jensvoid

Hack the Planet! On a #yolo trip around the word during a pandemic. Involved in https://t.co/UATbdfU5vH, #efail, #pdfex. Raw tech. No chit-chat.

Planet Earth Entrou em Mart 2013
219 Seguindo1.3K Seguidores
Jens Müller
Jens Müller@jensvoid·
@RDerenzy @emil_lerner ImageMagick is *not* required (but can be used as a vector to call Ghostscript). The 9.50 to 9.54 releases are vulnerable. I don't use Windows.
English
0
0
3
0
Ryan Derenzy
Ryan Derenzy@RDerenzy·
@jensvoid @emil_lerner There is just so much lack of info here.... Is imagemagick needed to exploit? Does 9.54 fix this (probably not) What about windows running ghost script
English
2
0
1
0
Jens Müller
Jens Müller@jensvoid·
@1AKDJ @emil_lerner Kali Rolling (less 551); likes to convert all kinds of obscure file types to plain text before displaying to the user; thereby increasing the attack surface
English
1
1
5
0
Jens Müller retweetou
-
-@lambdafu·
We found another flaw in the design of TLS! If you have servers that share certificates across services you might want to take a look at this: alpaca-attack.com. 🧵👇
- tweet media
English
9
245
514
0
Jens Müller
Jens Müller@jensvoid·
"PhD Defense" can finally be crossed off that to-do list. So long @HGI_Bochum, and thanks for all the fish!
Jens Müller tweet media
English
6
1
41
0
Sam Chandler
Sam Chandler@nitro_sam·
@Klose7 We sure do. Email security@gonitro.com. Details can be found here too: #securityUpdates" target="_blank" rel="nofollow noopener">gonitro.com/product/downlo…. Feel free to DM me if any issues.
San Francisco, CA 🇺🇸 English
2
0
0
0
Jens Müller
Jens Müller@jensvoid·
Have you ever heard of the mailto:?attach=~/… parameter? It allows to include arbitrary files on disk. So, why break PGP if you can politely ask the victim's mail client to include the private key? (1/4)
GIF
English
33
959
2.4K
0
Jens Müller
Jens Müller@jensvoid·
@j_o_n__w @Ug_0Security Sry, the line is "ATTACH=$(/bin/echo -e $(echo "$MAILTO" | grep '^attach='..." in the run_thunderbird() function of xdg-email. Thanks.
English
0
0
0
0
Jens Müller
Jens Müller@jensvoid·
@j_o_n__w @Ug_0Security Can you confirm that you are using xdg-email (e.g., by commenting out line 51 in /usr/bin/xdg-email and then testing if it still works)?
English
0
0
0
0
Jens Müller
Jens Müller@jensvoid·
@j_o_n__w @Ug_0Security This is bad. It had been fixed in/by TB in the past. But imho xdg-email re-opens the attack surface: #L51" target="_blank" rel="nofollow noopener">gitlab.freedesktop.org/xdg/xdg-utils/…
English
0
0
0
0
Jens Müller retweetou
Albert Astals Cid
Albert Astals Cid@tsdgeos·
@JamesHenstridge @jensvoid Yes. See me other answer, for some reason this escaped KDE Security Team radar and i thought it had not been reported to KDE while it had indeed been.
English
0
1
5
0