<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
    <channel>
        <title>polict.net | blogposts</title>
        <link>http://polict.net/</link>
        <description>polict's blogposts</description>
        <language>en</language>
        <lastBuildDate>Sat, 19 Jun 2021 03:37:00 -0000</lastBuildDate>
        <item>
            <title>Pre-auth root remote code execution in QNAP NAS</title>
            <link>https://www.shielder.it/advisories/qnap-musicstation-malwareremover-pre-auth-remote-code-execution/</link>
            <description>QNAP MusicStation and MalwareRemover pre-installed official apps are affected by an arbitrary file upload and a command injection, leading to pre-auth remote root command execution.</description>
            <pubDate>Tue, 19 May 2021 13:33:37 -0000</pubDate>
            <image>
                <url>https://www.shielder.it/img/blog/home-2.svg</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/advisories/qnap-musicstation-malwareremover-pre-auth-remote-code-execution/</guid>
        </item>
        <item>
            <title>Hunting for bugs in Telegram's animated stickers remote attack surface</title>
            <link>https://www.shielder.it/blog/2021/02/hunting-for-bugs-in-telegrams-animated-stickers-remote-attack-surface/</link>
            <description>My 2020 journey in researching the lottie animation format, its integration in mobile apps and the vulnerabilities triggerable by a remote attacker against any Telegram user.</description>
            <pubDate>Tue, 16 Feb 2021 13:33:37 -0000</pubDate>
            <image>
                <url>https://www.shielder.it/img/blog/home-2.svg</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/blog/2021/02/hunting-for-bugs-in-telegrams-animated-stickers-remote-attack-surface/</guid>
        </item>
        <item>
            <title>Auth Bypass and RCE in Infinite WP Admin Panel</title>
            <link>https://www.shielder.it/advisories/infinite-wp-userloginresetpassword-unauthenticated-account-takeover-and-rce/</link>
            <description>A vulnerability in InfiniteWP allows unauthenticated users to log-in if they know an email address of one of the users in the system, this is done through a flaw in the password reset mechanism of the product. An additional vulnerability allows the attacker to achieve Remote Code Execution.</description>
            <pubDate>Tue, 8 Dec 2020 10:00:00 -0000</pubDate>
            <image>
                <url>https://www.shielder.it/img/blog/home-3.svg</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/advisories/infinite-wp-userloginresetpassword-unauthenticated-account-takeover-and-rce/</guid>
        </item>
        <item>
            <title>Sometimes they come back: exfiltration through MySQL and CVE-2020-11579</title>
            <link>https://www.shielder.it/blog/2020/07/sometimes-they-come-back-exfiltration-through-mysql-and-cve-2020-11579/</link>
            <description>Walkthrough and exploitation of MySQL LOCAL INFILE accompanied by the release of a new open-source tool to exploit similar vulnerabilities.</description>
            <pubDate>Sun, 28 Jul 2020 10:00:00 -0000</pubDate>
            <image>
                <url>https://www.shielder.it/img/blog/CVE-2020-11579.gif</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/blog/2020/07/sometimes-they-come-back-exfiltration-through-mysql-and-cve-2020-11579/</guid>
        </item>
        <item>
            <title>Bitwarden Server 1.35.1 Blind Server-Side Request Forgery (SSRF)</title>
            <link>https://hackerone.com/reports/925527</link>
            <description>Bitwarden Server 1.35.1 is affected by a blind Server-Side Request Forgery (SSRF): an authenticated attacker can trigger arbitrary HTTP GET requests, even to locally exposed services, by adding a credential for a malicious domain.</description>
            <pubDate>Thu, 16 Jul 2020 10:00:00 -0000</pubDate>
            <image>
                <url>https://bitwarden.com/images/logo-vertical-white.svg</url>
            </image>
            <guid isPermaLink="false">https://hackerone.com/reports/925527</guid>
        </item>
        <item>
            <title>Web tracking via HTTP cache cross-site leaks</title>
            <link>http://polict.net/blog/web-tracking-via-http-cache-xs-leaks</link>
            <description>Google Chrome and Mozilla Firefox desktop users using the default configuration can be identified and tracked online if they are logged-in popular social networks, have JavaScript enabled and visit malicious websites.</description>
            <pubDate>Sun, 8 Sep 2019 10:00:00 -0000</pubDate>
            <image>
                <url>https://polict.net/blog/web-tracking-via-http-cache-xs-leaks/explanation.png</url>
            </image>
            <guid isPermaLink="false">http://polict.net/web-tracking-via-http-cache-xs-leaks</guid>
        </item>
        <item>
            <title>On insecure zip handling, Rubyzip and Metasploit RCE (CVE-2019-5624)</title>
            <link>https://blog.doyensec.com/2019/04/24/rubyzip-bug.html</link>
            <description>During one of our projects we had the opportunity to audit a Ruby-on-Rails (RoR) web application handling zip files using the Rubyzip gem. Zip files have always been an interesting entry-point to triggering multiple vulnerability types, including path traversals and symlink file overwrite attacks. As the library under testing had symlink processing disabled, we focused on path traversal exploitation. This blog post discusses our results, the “bug” discovered in the library itself and the implication of such an issue in a popular piece of software - Metasploit...</description>
            <pubDate>Wed, 24 Apr 2019 10:00:00 -0000</pubDate>
            <image>
                <url>https://blog.doyensec.com/public/images/msf-zip.png</url>
            </image>
            <guid isPermaLink="false">https://blog.doyensec.com/2019/04/24/rubyzip-bug.html</guid>
        </item>
        <item>
            <title>Nagios XI 5.5.10: XSS to #</title>
            <link>https://www.shielder.it/blog/2019/04/nagios-xi-5.5.10-xss-to-/</link>
            <description>Walkthrough of a 1-click root RCE exploit chain in Nagios XI 5.5.10 by polict: XSS, RCE and local privilege escalation in a single URL click.</description>
            <pubDate>Wed, 10 Apr 2019 10:00:00 -0000</pubDate>
            <image>
                <url>https://www.shielder.it/img/blog/home-1.svg</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/blog/2019/04/nagios-xi-5.5.10-xss-to-/</guid>
        </item>
        <item>
            <title>CVE-2018-17057: yet another phar deserialization in TCPDF</title>
            <link>http://polict.net/blog/CVE-2018-17057</link>
            <description>In TCPDF &lt;= 6.2.19 it is possible to exploit a PHP Object Injection via malicious HTML code and potentially achieve Remote Code Execution (RCE).</description>
            <pubDate>Sun, 17 Mar 2019 10:00:00 -0000</pubDate>
            <guid isPermaLink="false">http://polict.net/CVE-2018-17057</guid>
        </item>
        <item>
            <title>XSSGame by Google at #HITB2017AMS Writeup</title>
            <link>https://www.shielder.it/blog/2017/04/xssgame-by-google-at-hitb2017ams-writeup/</link>
            <description>Walkthrough of the Google XSS Game CTF @ Hack in the Box Amsterdam 2017 (HITBAMS2017): 8 challenges to win a Nexus 5X -- find out how we won it! 🤟🏻</description>
            <pubDate>Wed, 26 Apr 2017 10:00:00 -0000</pubDate>
            <image>
                <url>https://www.shielder.it//img/blog/googlectf-intro.png</url>
            </image>
            <guid isPermaLink="false">https://www.shielder.it/blog/2017/04/xssgame-by-google-at-hitb2017ams-writeup/</guid>
        </item>
    </channel>
</rss>
