xlr8 •

1.8K posts

xlr8 • banner
xlr8 •

xlr8 •

@ransomsec

(◕‿◕)

/ เข้าร่วม Mart 2021
393 กำลังติดตาม1.1K ผู้ติดตาม
xlr8 • รีทวีตแล้ว
striga
striga@striga_ai·
Unauthenticated RCE in Apache Tomcat (CVE-2026-34486) The EncryptInterceptor was supposed to protect cluster communication. A fix for a padding oracle vulnerability moved one line outside a try block, and the encryption layer silently started forwarding every failed decryption straight into unfiltered Java deserialization. We found it with Striga, built the exploit, and reported it to The Apache Software Foundation. striga.ai/research/tomca…
English
4
61
216
24.1K
xlr8 • รีทวีตแล้ว
André Baptista
André Baptista@0xacb·
CI/CD pipelines provide a lot of juicy attack surface. One common pattern: a build system lets you specify an output path for artifacts. If that path isn't sanitized, a ../ sequence lets you write files anywhere on the build server. With AFW, you can create a cronjob, /etc/ld.so.preload, __init__.py, a shell profile etc, and you may be able to have RCE. I've seen some isolated for outbound, so doing a "sleep 100" is always worth it for blind RCE. Even without direct path traversal, many CI/CD systems let pipeline configs reference scripts, pull artifacts, or set env vars. If an attacker can modify the pipeline definition (through a PR, a compromised dependency, or a writable config), the build server executes what they want with whatever credentials the runner has. If you're pentesting and the scope includes CI/CD, it's always worth checking what the runners can access. Build servers may have deploy keys, cloud credentials, and production secrets available as environment variables.
English
1
7
35
2K
xlr8 • รีทวีตแล้ว
RoboRocks
RoboRocks@malagojr·
Check this website don’t ask me any questions. You will be glad you did . Gutenberg.org
English
57
551
6.4K
1.2M
Het Mehta
Het Mehta@hetmehtaa·
Who is Satoshi Nakamoto?
Filipino
33
2
30
5.2K
xlr8 • รีทวีตแล้ว
André Baptista
André Baptista@0xacb·
Race conditions in OAuth flows can still happen in custom implementations. Here's how to find it: During the token exchange, the server is supposed to treat an authorization code as single-use. If you race the token endpoint by sending parallel requests with the same code simultaneously, vulnerable implementations may issue multiple valid access tokens and some won't properly revoke all of them. Tools like Turbo Intruder or even a simple multi-threaded script sending concurrent requests to the callback URL with different tokens may trigger it. Further reading here: blog.avuln.com/article/4
English
7
38
258
14.1K
xlr8 • รีทวีตแล้ว
jack
jack@jack·
everything is programming
English
2.6K
3.7K
22.8K
1.4M
zack0x01
zack0x01@zack0x01_·
Tmux is so f*** amazing
English
5
2
24
1.9K
R136a1
R136a1@TheEnergyStory·
🚨 Newest TeamPCP Supply Chain Compromise Affects Rust cargo-env-parser (v1.0.19) I have found that the Rust cargo-env-parser v1.0.19 crate has been compromised via a supply chain attack by the threat actor TeamPCP. There is a malicious payload hidden within the pre-build scripts that downloads additional malware for Windows, macOS and Linux. If your project depends on this crate, assume your environment variables are compromised and rotate your credentials immediately! Full technical breakdown, IOCs, and mitigation steps can be found here: r136a1.dev/teampcp_cargo_…
English
22
63
367
44.5K
NSG650
NSG650@nsg650·
Economy boutta crash
Italiano
4
0
17
680
xlr8 •
xlr8 •@ransomsec·
Ok how can we contact with David Forsythe and Kyla Guru. @AnthropicAI 🤠
xlr8 • tweet media
English
2
0
0
94
xlr8 • รีทวีตแล้ว
Rami McCarthy
Rami McCarthy@ramimacisabird·
npm security on the case, both malicious axios versions have been unpublished!
Rami McCarthy tweet media
English
15
227
1.3K
99.5K
xlr8 • รีทวีตแล้ว
Socket
Socket@SocketSecurity·
🚨 Active supply chain attack on axios@1.14.1. The latest version pulls in plain-crypto-js@4.2.1 -- a brand-new package that didn't exist before today. Socket's AI analysis flags it as a malicious obfuscated dropper: runtime deobfuscation, dynamic execSync loading, payload staging to temp/ProgramData directories, and post-execution artifact deletion. Consistent with supply chain malware. We're still investigating. If you use axios, pin your version and audit your lockfile.
English
10
242
1K
233.8K
xlr8 • รีทวีตแล้ว
Feross
Feross@feross·
🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.
English
545
4.1K
16.3K
12.2M
xlr8 • รีทวีตแล้ว
xlr8 • รีทวีตแล้ว
Anas Almizani
Anas Almizani@x6vrn·
i wrote a blog about the art of xs-leak attacks, i did a deep dive into chromium source code for an xs-leak oracle, have fun 😄 x6vrn.github.io/xsleaks-part1.…
English
0
47
176
13K
xlr8 • รีทวีตแล้ว
Lupin
Lupin@0xLupin·
Amazing website from @ramimacisabird showcasing the entire TeamPCP attack on trivy and LiteLLM: #myths" target="_blank" rel="nofollow noopener">ramimac.me/teampcp/#myths
English
0
6
33
2.5K
xlr8 • รีทวีตแล้ว
dawgyg - WoH
dawgyg - WoH@thedawgyg·
dawgyg - WoH tweet media
ZXX
5
39
247
7.7K