By Anna Hammond
July 21, 2021
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from July 12 to 19.
You should turn off autofill in your password manager
@marektoth explored the autofill function of popular password managers. The results are not reassuring: “It is possible to steal the saved login credentials from 11 of the 16 tested browsers and password managers in one mouse click.”.
This is worth knowing both as users (TL;DR: disable the autofill function) and hackers (XSS can be exploited to abuse the autofill feature and steal login credentials).
Remote code execution in cdnjs of Cloudflare (Cloudflare)
Diving into Dependabot along with a bug in npm (GitHub, $8,117)
@ryotkak discovered a Remote Code Execution via Path traversal on Cloudflare’s cdnjs CDN library. It could have allowed attackers to tamper with 12.7% of all websites on the Internet.
Another interesting finding is @tyage‘s SSRF on GitHub’s Dependabot and RCE in npm. It reads like an investigation starting with the observation that Dependabot is enabled by default and can make commits on many repositories.
@vortexau‘s CDN is a Python script that compiles a list of subnets for major CDN and WAF providers. It runs every day and outputs results into a YAML file that you can use to quickly identify whether an IP belongs to a CDN of WAF.
This is a timesaver. I love this kind of tool/repo where the work is done once and everyone benefits from it.
Full-time bug hunter @ajxchapman launched a new training platform for bug hunters called bughuntr.io. Currently, it has 13 attack scenarios related to Web and Container/Docker hacking. They are free and range from beginner to expert level.
This is one platform I’m keeping an eye on as more scenarios, premium content and training are planned.
Should you do Bug Bounties for a Living?
@codingo_ shares some interesting questions to consider before taking the plunge into full-time bug hunting. This is must reading if you’re thinking about it and want to maximize your chances of success.
HackerSploit: Docker Security Series, Part 1 & Part 2 (starting July 23)
Hacker Tools: Aquatone – Visualize your attack surface & Blog version
Radio Hack Ep1: Red Teaming – Ahmed Sultan (in Arabic)
ACM WiSec 2021 & Schedule #WiFi
Nim on the Attack: Process Injection Using Nim and the Windows API
Working Around macOS Privacy Controls in Red Team Ops & Interesting macOS Chrome Browser Files
Deep Link Exploitation: Introduction & Open/unvalidated Redirection & Exploiting Android WebView Vulnerabilities
Empires and Deserts #Deserialization
SQL Injection – Lab #16 Blind SQL injection with out of band data exfiltration
Possible RCE vulnerability in fail2ban #Linux #RCE
CVE-2021-3438: 16 Years In Hiding – Millions of Printers Worldwide Vulnerable #Printers
Aruba in Chains: Chaining Vulnerabilities for Fun and Profit #Router
Analysis of Satisfyer Toys: Discovering an Authentication Bypass with r2 and Frida #Android
Bypassing Windows Hello Without Masks or Plastic Surgery #BiometricAuth
WooCommerce Unauthenticated SQL Injection Vulnerability #Web
SeriousSAM bug impacts all Windows 10 versions released in the past 2.5 years #Windows
Google TAG: How we protect users from 0-day attacks & Root causes analyses #Web #Browser #MemoryCorruption
Windows Print Spooler has a new unpatched Local Privilege Escalation (CVE-2021-34481) (PoC will be released at DEFCON)
CVE-2021-22555: Turning \x00\x00 into 10000$ (Google, $10,000)
RFD Vulnerability And Content-Disposition Header Bypass Story!
Stored XSS in custom emoji (GitLab, $3,000)
See more writeups on The list of bug bounty writeups.
cent: Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
ppfuzz: Rust tool to scan for prototype pollution
requests-ip-rotator: A Python library to utilize AWS API Gateway’s large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing
SimpleAutoBurp: Python script to run burp scans from CLI using Burp’s REST API
Lepus: Python tool for enumerating subdomains, checking for subdomain takeovers and performing port scans
How to use DOM Invader to find JSON data structures automatically, See if a sink is vulnerable & Find more attack surface
That time @pry0cc and @vict0ni found out how to use IPinfo.io API for free
Undocumented API endpoint in #AWS CloudShell to export IAM credentials
defenselessV1: Just another vulnerable web application
Bug bounty
Cybersecurity
Upcoming events
OWASP Nagpur Meetup #11 (Virtual) (July 25, feat. @zseano and @JR0ch17)
DEF CON 29 Red Team Village CTF, Red Team Village CyberWraith & #RedTeamTips
Tool updates
Awesome! Enjoy your well-deserved vacation alicanact60 ⛱️
We love seeing you enjoy your bug bounty life! If you too have wins, swag and joys to share with other Bug Bytes readers, tag us on social media.