You Talking To Me?

What is WebDriver and How does it work? WebDriver is a protocol used for web browser automation. It can drive a browser to perform various tests on web pages as if a real user was navigating through them. It allows simulating user actions such as clicking links, entering text and submitting forms, which can help test if your website is working as intended. It is usually used for front-end testing and web crawling in a headless environment....

April 12, 2021 · 11 min · Li JianTao (@cursered)

Chrome 1-Day Hunting - Uncovering and Exploiting CVE-2020-15999

Introduction This blog post details the exploitation process for the vulnerability CVE 2020-15999 in Google Chrome 86.0.4222.0 on Linux. While CVE 2020-15999 is a heap-based buffer overflow in the font-loading library Freetype rather than Chrome proper, its extensive use in the latter enables us to achieve code execution in the browser’s renderer. This post will not be focused on the analysis of the bug, but rather its exploitation, as extensive explanation and analysis can be found here....

January 9, 2021 · 17 min · Chai Yi Chen (@Hacker_Chai)

Instrumenting Adobe Reader with Frida

Frida is an open-source dynamic instrumentation toolkit that has become popular in recent years, and its use in mobile security is especially prevalent. In this post, I would like to provide a general introduction to the tool and show some examples of how it can also be used on the Windows platform. ...

November 13, 2020 · 10 min · Alan Chang (@tcode2k16)

Analysis & Exploitation of a Recent TP-Link Archer A7 Vulnerability

This post provides detailed analysis and an exploit achieving remote code execution for CVE-2020-10882, which was used at Pwn2Own 2019, on the TP-Link Archer C7: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. When parsing the slave_mac parameter, the process does not properly validate a user-supplied string before using it to execute a system call....

October 16, 2020 · 18 min · Lucas Tay (@c3xp1r)

Pwn2Own 2020: Oracle VirtualBox Escape

In this post, we will cover the vulnerabilities used at Pwn2Own 2020 for the Oracle VirtualBox escape. These two vulnerabilities affect Oracle VirtualBox 6.1.4 and prior versions. ...

September 25, 2020 · 9 min · Pham Hong Phi (@4nhdaden)

This Font is not Your Type

Half a year ago, I found a vulnerability in libFontParser.dylib, which is a part of CoreGraphics library that is widely used in macOS, iOS, iPadOS to parse and render fonts. This vulnerability was patched in iOS 13.5.1 & macOS 10.15.5. In this writeup, I will describe the bug in detail in hopes that it will help others to better understand this vulnerability. This issue could allow an attacker to execute code during the parsing of a malicious font....

September 4, 2020 · 3 min · Peter Nguyen Vu Hoang (@peternguyen14)

ASUSWRT URL Processing Stack Buffer Overflow

While processing the URL for any blacklisted XSS list like the script tag in the check_xss_blacklist function, a stack buffer overflow is possible by extending the length of the URL when accessing the web interface of the ASUS Router. To exploit it, stack pivoting technique is used before chaining up ROP gadgets to call our own custom command. In this post, we show how this can be exploited to get a reverse shell....

August 7, 2020 · 18 min · Lucas Tay (@c3xp1r)