<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>STAR Labs</title>
    <link>https://starlabs.sg/</link>
    <description>Recent content on STAR Labs</description>
    <image>
      <url>https://starlabs.sg/logo-white.png</url>
      <link>https://starlabs.sg/logo-white.png</link>
    </image>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 05 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://starlabs.sg/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Pickling the Mailbox: A Deep Dive into CVE-2025-20393</title>
      <link>https://starlabs.sg/blog/2026/01-pickling-the-mailbox-a-deep-dive-into-cve-2025-20393/</link>
      <pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2026/01-pickling-the-mailbox-a-deep-dive-into-cve-2025-20393/</guid>
      <description>TL;DR In December 2025, Cisco published https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 addressing CVE-2025-20393, a critical vulnerability (CVSS 10.0) affecting Cisco Secure Email Gateway and Secure Email and Web Manager. The advisory was notably sparse on technical details, describing only &amp;ldquo;Improper Input Validation&amp;rdquo; (CWE-20).
We decided to dig deeper. Through reverse engineering and code analysis of AsyncOS 15.5.3, we uncovered the root cause: a single-byte integer overflow in the EUQ RPC protocol that bypasses authentication and chains into Python pickle deserialization — achieving unauthenticated remote code execution with a single HTTP request.</description>
    </item>
    
    <item>
      <title>8th Anniversary: Embrace the new but don&#39;t forget the old</title>
      <link>https://starlabs.sg/blog/2026/01-embrace-the-new-but-dont-forget-the-old/</link>
      <pubDate>Thu, 08 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2026/01-embrace-the-new-but-dont-forget-the-old/</guid>
      <description>Eight years ago today, I started STAR Labs by hiring several fresh grads with no working experiences.
Today, I stand here with a different group of faces. Some of you were there from the beginning. Some of you joined along the way. Some of you just started last month.
And some of the people who were here&amp;hellip; weren&amp;rsquo;t anymore.
Not because they failed. Not because we failed them. But because life called them in different directions.</description>
    </item>
    
    <item>
      <title>2025: WE BROKE THINGS, WE BUILT THINGS, WE BROKE EVEN MORE THINGS</title>
      <link>https://starlabs.sg/blog/2025/12-2025-reflection/</link>
      <pubDate>Sat, 27 Dec 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/12-2025-reflection/</guid>
      <description>Most will talk about the success in their year-end posts. Great. Nobody talks about the failures. Nobody talks about what ACTUALLY happened.
Well, we are going to tell you about OUR STORY - the success AND the failures. The whole thing. Because that&amp;rsquo;s how we actually learn&amp;hellip;from our own mistakes.
So here it is, UNFILTERED. Buckle up.
 PWN2OWN 2025 BERLIN &amp;amp; IRELAND We could only bring one of our interns, Gerrard Tai, along with us to Pwn2Own.</description>
    </item>
    
    <item>
      <title>HEX ADVENT 2025: Crack the Advent, Conquer the Threat 🐛</title>
      <link>https://starlabs.sg/blog/2025/11-hex-advent-2025/</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/11-hex-advent-2025/</guid>
      <description>&amp;times;      HEX ADVENT 2025: Crack the Advent, Conquer the Threat 🐛 Last chance to register! Registration closing on 20 Dec 2025, 09:00 SGT!
WELCOME TO HEX ADVENT 2025, ‘tis the season to Unwrap Your Potential! 🎁
HEX ADVENT 2025 is a Christmas-themed CTF Advent Calendar, designed for women, by women.
What to Expect  12 Days, 12 Challenges: A structured schedule to build mastery across different CTF categories.</description>
    </item>
    
    <item>
      <title>HEX ADVENT 2025: Rules &amp; Information</title>
      <link>https://starlabs.sg/blog/2025/11-hex-advent-2025-rules-info/</link>
      <pubDate>Mon, 10 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/11-hex-advent-2025-rules-info/</guid>
      <description>Information   This is a solo CTF event open to women residing in Singapore or Malaysia.
  To register and be eligible for the prizes:
 Register on CTFd, and select the &amp;ldquo;eligible&amp;rdquo; bracket. Confirm your eligibility by filling in the Google Form.    The flag format is described by this regex: /^HEX{.*}$/
  There are a total of 12 challenges. One challenge will be released each day at 09:00 SGT within the period of 1 December 2025 to 12 December 2025.</description>
    </item>
    
    <item>
      <title>Pwn2Own Ireland 2025</title>
      <link>https://starlabs.sg/achievements/p2o-ireland-2025/</link>
      <pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-ireland-2025/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2025 Autumn edition of Pwn2Own (Pwn2Own Ireland) was held from 21st October to 23rd October 2025 in a on-site format where participants are back to competing in-person.</description>
    </item>
    
    <item>
      <title>Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer</title>
      <link>https://starlabs.sg/blog/2025/11-breaking-into-a-brother-mfc-j1010dw/</link>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/11-breaking-into-a-brother-mfc-j1010dw/</guid>
      <description>The Target: Brother MFC-J1010DW  Affected Models: Brother Printer MFC-J1010DW Vulnerable Firmware: Version &amp;lt;= 1.18  TL;DR: The Vulnerability Chain We discovered three vulnerabilities that when chained together, allow for complete remote compromise:
 Authentication Bypass via SNMP - Retrieve the printer&amp;rsquo;s serial number without authentication, allowing attackers to derive the default admin password Unauthenticated Firmware Rollback - Downgrade to vulnerable firmware versions over the network, no credentials required Buffer Overflow via Referer Header - Execute arbitrary code by crafting malicious HTTP headers  The result?</description>
    </item>
    
    <item>
      <title>Summer Pwnables: lz1 Solution</title>
      <link>https://starlabs.sg/blog/2025/09-lz1-solution/</link>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/09-lz1-solution/</guid>
      <description>TL;DR 🚀 We&amp;rsquo;re turning a simple compression library into a shell delivery service! This writeup exploits a buffer overflow in lz1/lz77 decompression by crafting malicious compressed data that overflows the stack and chains ROP gadgets for code execution. Ever wondered how a simple file compression tool could hand you the keys to a system? Well, buckle up because we&amp;rsquo;re about to turn andyherbert&amp;rsquo;s innocent lz1 compressor into our personal shell delivery service!</description>
    </item>
    
    <item>
      <title>Summer Pwnables: Temporal Paradox Engine Solution</title>
      <link>https://starlabs.sg/blog/2025/09-temporal-paradox-engine-solution/</link>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/09-temporal-paradox-engine-solution/</guid>
      <description>Last month, Jacob asked me to create a CTF challenge for the Summer Pwnables event. I went with a kernel pwnable since my goal was to teach students some more advanced Linux kernel exploitation techniques - something that wouldn&amp;rsquo;t get solved in a day (and hopefully not by AI either).
After building both the challenge and solution, I figured students should be able to crack it within 3-7 days. Turns out I was right about the timeline, but only one person actually solved it.</description>
    </item>
    
    <item>
      <title>Lost in Translation: Apache Vulnerabilities That Don&#39;t Count (Literally)</title>
      <link>https://starlabs.sg/blog/2025/09-lost-in-translation-apache-vulnerabilities-that-dont-count-literally/</link>
      <pubDate>Thu, 11 Sep 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/09-lost-in-translation-apache-vulnerabilities-that-dont-count-literally/</guid>
      <description>During our security research in 2024, we discovered several vulnerabilities in Apache Foundation projects that seem to have gotten &amp;rsquo;lost in translation&amp;rsquo; between our bug reports and the CVE assignment process. While we&amp;rsquo;ve been patiently waiting for these findings to officially &amp;lsquo;count,&amp;rsquo; they&amp;rsquo;ve apparently been stuck longer than a software update on a Friday afternoon. Almost a year went by without any CVEs assigned and which we completely forgot about until now.</description>
    </item>
    
    <item>
      <title>[Updates] Summer Pwnables 🔥</title>
      <link>https://starlabs.sg/blog/2025/08-updates-summer-pwnables/</link>
      <pubDate>Mon, 18 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/08-updates-summer-pwnables/</guid>
      <description>[Updates] Summer Pwnables 2025 Major Announcement: ISD Sponsorship We are pleased to announce that Internal Security Department (ISD) is sponsoring Summer Pwnables Challenge #0002 Challenge #003.
Distribution Rule  Challenge #002 and #003 are meant for Singaporean students. Each Singaporean student can only win once across all challenges to ensure broader community recognition. However, they can still submit their solutions in order to win the new &amp;ldquo;Grand Prize&amp;rdquo;  Prizes are still $100 SGD + the &amp;ldquo;From Day Zero to Zero Day&amp;rdquo; book written by Eugene &amp;ldquo;Spaceraccoon&amp;rdquo; Lim for the first five solvers.</description>
    </item>
    
    <item>
      <title>Summer Pwnables: When the Heat Rises, So Do the C-Shells 🔥</title>
      <link>https://starlabs.sg/blog/2025/08-summer-pwnables/</link>
      <pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/08-summer-pwnables/</guid>
      <description>🌴☀️ SUMMER PWNABLES 2025 ☀️🌴 The hottest hacking challenge on this side of Southeast Asia!  Think you can handle the heat? Time to prove your l33t skills are more than just talk! 😎🔥
The summer sun isn&amp;rsquo;t the only thing burning bright – we have cooked up some seriously spicy challenges that will test whether you are a true shell wizard! 🧙‍♂️✨
📍 ELIGIBILITY REQUIREMENTS This challenge is exclusively open to Singapore-based students only!</description>
    </item>
    
    <item>
      <title>My `Blind Date` with CVE-2025-29824</title>
      <link>https://starlabs.sg/blog/2025/07-my-blind-date-with-cve-2025-29824/</link>
      <pubDate>Wed, 16 Jul 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/07-my-blind-date-with-cve-2025-29824/</guid>
      <description>In April 2025, Microsoft patched a vulnerability that had become a key component in sophisticated ransomware attack chains. CVE-2025-29824, an use-after-free bug in the Windows Common Log File System (CLFS) driver, wasn&amp;rsquo;t the initial entry point for attackers. Instead, threat actors first compromised Cisco ASA firewalls, then used this Windows kernel vulnerability as the crucial privilege escalation step that transformed limited network access into complete system domination. This multi-stage approach represents the evolution of modern ransomware operations: sophisticated threat actors chaining together network infrastructure vulnerabilities with Windows kernel bugs to devastating effect.</description>
    </item>
    
    <item>
      <title>Fooling the Sandbox: A Chrome-atic Escape</title>
      <link>https://starlabs.sg/blog/2025/07-fooling-the-sandbox-a-chrome-atic-escape/</link>
      <pubDate>Thu, 10 Jul 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/07-fooling-the-sandbox-a-chrome-atic-escape/</guid>
      <description>For my internship, I was tasked by my mentor Le Qi to analyze CVE-2024-30088, a double-fetch race condition bug in the Windows Kernel Image ntoskrnl.exe. A public POC demonstrating EoP from Medium Integrity Level to SYSTEM is available on GitHub here.
Additionally, I was challenged (more like forced 💀) to chain the exploit to escape the Chrome Renderer Sandbox, achieving EoP from Untrusted Integrity Level to SYSTEM.
Easy, right? 🤡</description>
    </item>
    
    <item>
      <title>Solo: A Pixel 6 Pro Story (When one bug is all you need)</title>
      <link>https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/</link>
      <pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/</guid>
      <description>During my internship I was tasked to analyze a Mali GPU exploit on Pixel 7/8 devices and adapt it to make it work on another device: the Pixel 6 Pro.
While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find the correct symbol offsets and signatures for our target device), what&amp;rsquo;s interesting about Pixel 6 Pro is that it uses a different Mali GPU from the Pixel 7/8, which lacked support for a feature that one of the two vulnerabilities within the exploit relied on:</description>
    </item>
    
    <item>
      <title>Gone in 5 Seconds: How WARN_ON Stole 10 Minutes</title>
      <link>https://starlabs.sg/blog/2025/05-gone-in-5-seconds-how-warn_on-stole-10-minutes/</link>
      <pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/05-gone-in-5-seconds-how-warn_on-stole-10-minutes/</guid>
      <description>As part of my internship at STAR Labs, I was tasked to conduct N-day analysis of CVE-2023-6241. The original PoC can be found here, along with the accompanying write-up.
In this blog post, I will explain the root cause as well as an alternative exploitation technique used to exploit the page UAF, achieving arbitrary kernel code execution.
The following exploit was tested on a Pixel 8 running the latest version available prior to the patch.</description>
    </item>
    
    <item>
      <title>Badge &amp; Lanyard Challenges @ OBO 2025</title>
      <link>https://starlabs.sg/blog/2025/05-badge-lanyard-challenge-at-obo-2025/</link>
      <pubDate>Wed, 28 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/05-badge-lanyard-challenge-at-obo-2025/</guid>
      <description>Introduction We are back with Round 2 of the Off-By-One conference — where bits meet breadboards and bugs are celebrated! 🐛⚡
If you are into hardware and IoT security, you&amp;rsquo;ll know one thing&amp;rsquo;s for sure: the STAR Labs SG badge is not your average conference bling bling. This year&amp;rsquo;s badge isn&amp;rsquo;t just a collector&amp;rsquo;s item — it&amp;rsquo;s a playground for the curious, packed with new challenges inspired by months&amp;rsquo;s worth of research and hackery.</description>
    </item>
    
    <item>
      <title>Pwn2Own Berlin 2025</title>
      <link>https://starlabs.sg/achievements/p2o-berlin-2025/</link>
      <pubDate>Sat, 17 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-berlin-2025/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2025 spring edition of Pwn2Own (Pwn2Own Berlin) was held from 15th May to 17th May 2025 in a on-site format where participants are back to competing in-person.</description>
    </item>
    
    <item>
      <title>Breaking Out of Restricted Mode: XSS to RCE in Visual Studio Code</title>
      <link>https://starlabs.sg/blog/2025/05-breaking-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/</link>
      <pubDate>Wed, 14 May 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/05-breaking-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/</guid>
      <description>In April 2024, I discovered a high-severity vulnerability in Visual Studio Code (VS Code &amp;lt;= 1.89.1) that allows attackers to escalate a Cross-Site Scripting (XSS) bug into full Remote Code Execution (RCE)—even in Restricted Mode.
The desktop version of Visual Studio Code runs on Electron. Renderer processes are sandboxed and communicate with the main process through Electron&amp;rsquo;s IPC mechanism.
An XSS vulnerability in the newly-introduced minimal error rendering mode for Jupyter notebooks enables arbitrary JavaScript code to be executed within the vscode-app WebView for the notebook renderer.</description>
    </item>
    
    <item>
      <title>CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)</title>
      <link>https://starlabs.sg/blog/2025/03-cimfs-crashing-in-memory-finding-system-kernel-edition/</link>
      <pubDate>Tue, 25 Mar 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/03-cimfs-crashing-in-memory-finding-system-kernel-edition/</guid>
      <description>Introduction Many vulnerability writeups nowadays focus on the exploitation process when it comes to software bugs. The term &amp;ldquo;Exploit Developer&amp;rdquo; is also still used synonymously with Vulnerability Research, presumably coming from the early 2000s where bugs were easily discoverable and the community was just beginning to explore the art of exploitation. However nowadays with SDL and continuous fuzzing, the discovery of unknown vulnerabilities in crucial systems is getting more important, arguably more than the exploitation process.</description>
    </item>
    
    <item>
      <title>STAR Labs Windows Exploitation Challenge 2025 Writeup</title>
      <link>https://starlabs.sg/blog/2025/03-star-labs-windows-exploitation-challenge-2025-writeup/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/03-star-labs-windows-exploitation-challenge-2025-writeup/</guid>
      <description>STAR Labs Windows Exploitation Challenge Writeup Over the past few months, the STAR Labs team has been hosting a Windows exploitation challenge. I was lucky enough to solve it and got myself a ticket to Off-By-One conference. Here is my writeup for the challenge!
Analyzing the binary We are given a Windows kernel driver. Basic analysis shows that it is used to receive and save messages sent from usermode.
Important structures There are two key structures used in this driver: handle and message entry.</description>
    </item>
    
    <item>
      <title>Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)</title>
      <link>https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/</link>
      <pubDate>Sun, 02 Feb 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/</guid>
      <description>Imagine downloading a game from a third-party app store. You grant it seemingly innocuous permissions, but hidden within the app is a malicious exploit that allows attackers to steal your photos, eavesdrop on your conversations, or even take complete control of your device. This is the kind of threat posed by vulnerabilities like CVE-2022-22706 and CVE-2021-39793, which we&amp;rsquo;ll be dissecting in this post. These vulnerabilities affect Mali GPUs, commonly found in many Android devices, and allow unprivileged apps to gain root access.</description>
    </item>
    
    <item>
      <title>CVE-2024-26230: Windows Telephony Service - It&#39;s Got Some Call-ing Issues (Elevation of Privilege)</title>
      <link>https://starlabs.sg/blog/2025/cve-2024-26230-windows-telephony-service-its-got-some-call-ing-issues/</link>
      <pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/cve-2024-26230-windows-telephony-service-its-got-some-call-ing-issues/</guid>
      <description>Executive Summary CVE-2024-26230 is a critical vulnerability found in the Windows Telephony Service (TapiSrv), which can lead to an elevation of privilege on affected systems. The exploit leverages a use-after-free in FreeDialogInstance. By manipulating the registry, an attacker controls memory allocation to create a fake object, triggering the UAF in TUISPIDLLCallback to gain code execution. This is further chained with techniques to bypass mitigations like CFG and ultimately load a malicious DLL, escalating privileges to SYSTEM via PrintSpoofer.</description>
    </item>
    
    <item>
      <title>Celebrating 7 Years of STAR Labs SG</title>
      <link>https://starlabs.sg/blog/2025/01-celebrating-7-years/</link>
      <pubDate>Sun, 12 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/01-celebrating-7-years/</guid>
      <description>🎉🎊 Cheers to 7 Amazing Years! 🎊🎉
On 8th January 2018, STAR Labs SG Pte. Ltd. was born with a simple but bold idea: to do fun offensive research that protects customers. Seven years later, that spark of curiosity and innovation has grown into something extraordinary. 🚀
Our Humble Beginnings 🛠️ It all started when STAR Labs had a small, passionate group of researchers: Shi Ji, Wei Lei, Phạm Hồng Phi, Phan Thanh Duy, and Tạ Đình Sung.</description>
    </item>
    
    <item>
      <title>STAR Labs 2025 New Year Exploitation Challenge</title>
      <link>https://starlabs.sg/blog/2025/01-star-labs-2025-new-year-exploitation-challenge/</link>
      <pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2025/01-star-labs-2025-new-year-exploitation-challenge/</guid>
      <description>Think you’ve got what it takes to pop shells and snag your ticket to&amp;hellip; RE//verse and Off-By-One? 😏
🔥 Windows Exploitation Challenge 🔥  Get SYSTEM privileges by exploiting a bug in the downloadable driver below. (pwn it!) Keep the OS alive and happy — no BSODs, no excuses! Your exploit must work on Windows 11 24H2. Submit your winning solutions(exploit source code and writeup) to info@starlabs.sg. If you think you&amp;rsquo;ve figured out the bug but can&amp;rsquo;t exploit it in time, feel free to send us a writeup too describing how you would exploit it!</description>
    </item>
    
    <item>
      <title>All I Want for Christmas is a CVE-2024-30085 Exploit</title>
      <link>https://starlabs.sg/blog/2024/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/</link>
      <pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2024/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/</guid>
      <description>TLDR CVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver cldflt.sys. By crafting a custom reparse point, it is possible to trigger the buffer overflow to corrupt an adjacent _WNF_STATE_DATA object. The corrupted _WNF_STATE_DATA object can be used to leak a kernel pointer from an ALPC handle table object. A second buffer overflow is then used to corrupt another _WNF_STATE_DATA object, which is then used to corrupt an adjacent PipeAttribute object.</description>
    </item>
    
    <item>
      <title>Behind the Scenes: Understanding CVE-2022-24547</title>
      <link>https://starlabs.sg/blog/2024/12-behind-the-scenes-understanding-cve-2022-24547/</link>
      <pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2024/12-behind-the-scenes-understanding-cve-2022-24547/</guid>
      <description>TL;dr Vulnerabilities can often be found in places we don’t expect, and CVE-2022-24547 in CastSrv.exe is one of the examples. CVE-2022-24547 is a privilege escalation vulnerability in CastSrv.exe, allowing attackers to bypass security and gain elevated privileges. We’ll break down how the bug works, its exploitation, and how to protect against it.
Summary          Vendor Microsoft   Security Impact Elevation of Privilege   CVE ID CVE-2022-24547    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2024-6781) Calibre Arbitrary File Read</title>
      <link>https://starlabs.sg/advisories/24/24-6781/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-6781/</guid>
      <description>Summary    Product Calibre     Vendor Calibre   Severity High - Unprivileged adversaries may exploit software vulnerabilities to perform relative path traversal to achieve arbitrary file read   Affected Versions &amp;lt;= 7.14.0 (latest version as of writing)   Tested Versions 7.14.0   CVE Identifier CVE-2024-6781   CVE Description Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;) vulnerability allows Relative Path Traversal   CWE Classification(s) CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)   CAPEC Classification(s) CAPEC-139 Relative Path Traversal    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2024-6782) Calibre Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/24/24-6782/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-6782/</guid>
      <description>Summary    Product Calibre     Vendor Calibre   Severity Critical - Unprivileged adversaries may exploit software vulnerabilities to perform remote code execution   Affected Versions 6.9.0 ~ 7.14.0 (latest version as of writing)   Tested Versions 7.14.0   CVE Identifier CVE-2024-6782   CVE Description Improper Access Control in Calibre Content Server allows remote code execution   CWE Classification(s) CWE-863: Incorrect Authorization   CAPEC Classification(s) CAPEC-253: Remote Code Inclusion    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2024-7008) Calibre Reflected Cross-Site Scripting (XSS)</title>
      <link>https://starlabs.sg/advisories/24/24-7008/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-7008/</guid>
      <description>Summary    Product Calibre     Vendor Calibre   Severity Medium   Affected Versions &amp;lt;= 7.15.0 (latest version as of writing)   Tested Versions 7.15.0   CVE Identifier CVE-2024-7008   CWE Classification(s) CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or &amp;lsquo;Cross-site Scripting&amp;rsquo;)   CAPEC Classification(s) CAPEC-591 Reflected XSS    CVSS3.1 Scoring System Base Score: 5.4 (Medium) Vector String: CVSS:3.</description>
    </item>
    
    <item>
      <title>(CVE-2024-7009) Calibre SQLite Injection</title>
      <link>https://starlabs.sg/advisories/24/24-7009/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-7009/</guid>
      <description>Summary    Product Calibre     Vendor Calibre   Severity Medium   Affected Versions &amp;lt;= 7.15.0 (latest version as of writing)   Tested Versions 7.15.0   CVE Identifier CVE-2024-7009   CWE Classification(s) CWE-89 Improper Neutralization of Special Elements used in an SQL Command (&amp;lsquo;SQL Injection&amp;rsquo;)   CAPEC Classification(s) CAPEC-66 SQL Injection    CVSS3.1 Scoring System Base Score: 4.2 (Medium) Vector String: CVSS:3.</description>
    </item>
    
    <item>
      <title>(CVE-2024-1837) Singtel RT5703W Unauthenticated Command Injection RCE via Login Vulnerability</title>
      <link>https://starlabs.sg/advisories/24/24-1837/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-1837/</guid>
      <description>Summary    Product Singtel WI-FI 6 ROUTER RT5703W     Vendor Singtel/Askey   Severity Critical - Adversaries may exploit software vulnerabilities to execute arbitrary commands on the underlying OS with root privileges.   Affected Versions V1.6.4-5194 (latest version as of writing)   Tested Versions V1.6.4-5194 (latest version as of writing)   Internal Identifier STAR-2023-0097   CVE Identifier TBD   CVE Description OS command injection vulnerability in net.</description>
    </item>
    
    <item>
      <title>(CVE-2024-1838) Singtel RT5703W Authenticated Command Injection RCE via SetLoginPwd Vulnerability</title>
      <link>https://starlabs.sg/advisories/24/24-1838/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/24/24-1838/</guid>
      <description>Summary    Product Singtel WI-FI 6 ROUTER RT5703W     Vendor Singtel/Askey   Severity High - Adversaries may exploit software vulnerabilities to execute arbitrary commands on the underlying OS with root privileges.   Affected Versions V1.6.4-5194 (latest version as of writing)   Tested Versions V1.6.4-5194 (latest version as of writing)   Internal Identifier STAR-2023-0098   CVE Identifier TBD   CVE Description OS command injection vulnerability in net.</description>
    </item>
    
    <item>
      <title>#BadgeLife @ Off-By-One Conference 2024</title>
      <link>https://starlabs.sg/blog/2024/07-badgelife-at-off-by-one-conference-2024/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2024/07-badgelife-at-off-by-one-conference-2024/</guid>
      <description>Introduction As promised, we are releasing the firmware and this post for the Off-By-One badge about one month after the event, allowing interested participants the opportunity to explore it. If you&amp;rsquo;re interested in learning more about the badge design process, please let us know. We were thrilled to introduce the Octopus Badge at the first-ever Off-By-One Conference 2024. The badge was a one of the highlight at the conference, as it included hardware-focused CTF challenges.</description>
    </item>
    
    <item>
      <title>Send()-ing Myself Belated Christmas Gifts - GitHub.com&#39;s Environment Variables &amp; GHES Shell</title>
      <link>https://starlabs.sg/blog/2024/04-sending-myself-github-com-environment-variables-and-ghes-shell/</link>
      <pubDate>Mon, 06 May 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2024/04-sending-myself-github-com-environment-variables-and-ghes-shell/</guid>
      <description>Earlier this year, in mid-January, you might have come across this security announcement by GitHub.
In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively simple, one-liner vulnerability which I initially assessed to likely be of low impact, and how I turned it into one of the most impactful bugs in GitHub&amp;rsquo;s bug bounty history.
Spoiler: The vulnerability enabled disclosure of all environment variables of a production container on GitHub.</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2024</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2024/</link>
      <pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2024/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2024 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 20th March to 21st March 2024 in a hybrid format where participants are back to competing in-person and in virtual.</description>
    </item>
    
    <item>
      <title>Route to Safety: Navigating Router Pitfalls</title>
      <link>https://starlabs.sg/blog/2024/route-to-safety-navigating-router-pitfalls/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2024/route-to-safety-navigating-router-pitfalls/</guid>
      <description>Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim&amp;rsquo;s internal network or sensitive data. Additionally, there has been an ongoing trend of attackers continually incorporating new router exploits into their arsenal for use in botnets, such as the Mirai Botnet.
Consumer grade devices are especially attractive to attackers, due to many security flaws in them. Devices with lower security often contain multiple bugs that attackers can exploit easily, rendering them vulnerable targets.</description>
    </item>
    
    <item>
      <title>(CVE-2023-3368) Chamilo LMS Unauthenticated Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-3368/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-3368/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.20   Tested Versions v1.11.20 (latest version as of writing)   CVE Identifier CVE-2023-3368   CVE Description Command injection in /main/webservices/additional_webservices.php in Chamilo LMS &amp;lt;= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters.</description>
    </item>
    
    <item>
      <title>(CVE-2023-3533) Chamilo LMS Unauthenticated Remote Code Execution via Arbitrary File Write</title>
      <link>https://starlabs.sg/advisories/23/23-3533/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-3533/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.20   Tested Versions v1.11.20 (latest version as of writing)   CVE Identifier CVE-2023-3533   CVE Description Path traversal in file upload functionality in /main/webservices/additional_webservices.php in Chamilo LMS &amp;lt;= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write.</description>
    </item>
    
    <item>
      <title>(CVE-2023-3545) Chamilo LMS Htaccess File Upload Security Bypass</title>
      <link>https://starlabs.sg/advisories/23/23-3545/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-3545/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.20   Tested Versions v1.11.20 (latest version as of writing)   CVE Identifier CVE-2023-3545   CVE Description Improper sanitisation in main/inc/lib/fileUpload.lib.php in Chamilo LMS &amp;lt;= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of .</description>
    </item>
    
    <item>
      <title>(CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4220/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4220/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4220   CVE Description Unrestricted file upload in big file upload functionality in /main/inc/lib/javascript/bigupload/inc/bigUpload.php in Chamilo LMS &amp;lt;= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4221) Chamilo LMS Learning Path PPT2LP OpenofficePresentation Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-4221/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4221/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4221   CVE Description Command injection in main/lp/openoffice_presentation.class.php in Chamilo LMS &amp;lt;= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4222) Chamilo LMS Learning Path PPT2LP OpenofficeTextDocument Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-4222/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4222/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4222   CVE Description Command injection in main/lp/openoffice_text_document.class.php in Chamilo LMS &amp;lt;= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4223) Chamilo LMS Document Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4223/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4223/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4223   CVE Description Unrestricted file upload in /main/inc/ajax/document.ajax.php in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4224) Chamilo LMS Dropbox Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4224/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4224/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4224   CVE Description Unrestricted file upload in /main/inc/ajax/dropbox.ajax.php in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4225) Chamilo LMS Exercise Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4225/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4225/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4225   CVE Description Unrestricted file upload in /main/inc/ajax/exercise.ajax.php in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4226) Chamilo LMS Work Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4226/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4226/</guid>
      <description>Summary    Product Chamilo     Vendor Chamilo   Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.   Affected Versions &amp;lt;= v1.11.24   Tested Versions v1.11.24 (latest version as of writing)   CVE Identifier CVE-2023-4226   CVE Description Unrestricted file upload in /main/inc/ajax/work.ajax.php in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.</description>
    </item>
    
    <item>
      <title>Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969)</title>
      <link>https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/</link>
      <pubDate>Fri, 24 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/</guid>
      <description>Introduction The prevalence of memory corruption bugs persists, posing a persistent challenge for exploitation. This increased difficulty arises from advancements in defensive mechanisms and the escalating complexity of software systems. While a basic proof of concept often suffices for bug patching, the development of a functional exploit capable of bypassing existing countermeasures provides valuable insights into the capabilities of advanced threat actors. This holds particularly true for the scrutinized driver, cldflt.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1713) Bitrix24 Remote Command Execution (RCE) via Insecure Temporary File Creation</title>
      <link>https://starlabs.sg/advisories/23/23-1713/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1713/</guid>
      <description>Summary    Product Bitrix24     Vendor Bitrix24   Severity High   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1713   CVE Description Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted &amp;ldquo;.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1714) Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction</title>
      <link>https://starlabs.sg/advisories/23/23-1714/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1714/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity High   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1714   CVE Description Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1715 &amp; CVE-2023-1716) Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Edit Page</title>
      <link>https://starlabs.sg/advisories/23/23-1715/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1715/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity Critical   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1715 &amp;amp; CVE-2023-1716   CVE Description (CVE-2023-1715): A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1717) Bitrix24 Cross-Site Scripting (XSS) via Client-side Prototype Pollution</title>
      <link>https://starlabs.sg/advisories/23/23-1717/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1717/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity Critical   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1717   CVE Description Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting __proto__[tag] and __proto__[text].</description>
    </item>
    
    <item>
      <title>(CVE-2023-1718) Bitrix24 Denial-of-Service (DoS) via Improper File Stream Access</title>
      <link>https://starlabs.sg/advisories/23/23-1718/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1718/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity High   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1718   CVE Description Improper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted &amp;ldquo;tmp_url&amp;rdquo;.   CWE Classification(s) CWE-835 Loop with Unreachable Exit Condition (&amp;lsquo;Infinite Loop&amp;rsquo;)   CAPEC Classification(s) CAPEC-545 Pull Data from System Resources    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1719) Bitrix24 Insecure Global Variable Extraction</title>
      <link>https://starlabs.sg/advisories/23/23-1719/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1719/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity High   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1719   CVE Description Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim&amp;rsquo;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.</description>
    </item>
    
    <item>
      <title>(CVE-2023-1720) Bitrix24 Stored Cross-Site Scripting (XSS) via File Upload</title>
      <link>https://starlabs.sg/advisories/23/23-1720/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-1720/</guid>
      <description>Summary:    Product Bitrix24     Vendor Bitrix24   Severity High   Affected Versions Bitrix24 22.0.300 (latest version as of writing)   Tested Versions Bitrix24 22.0.300 (latest version as of writing)   CVE Identifier CVE-2023-1720   CVE Description Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim&amp;rsquo;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.</description>
    </item>
    
    <item>
      <title>Pwn2Own Toronto 2023</title>
      <link>https://starlabs.sg/achievements/p2o-toronto-2023/</link>
      <pubDate>Tue, 24 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-toronto-2023/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2023 fall edition of Pwn2Own (Pwn2Own Toronto) was held from 24th October to 27th October 2023 in a hybrid format (offline and online).</description>
    </item>
    
    <item>
      <title>(CVE-2023-4197) Dolibarr ERP CRM (&lt;= 18.0.1) Improper Input Sanitization Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-4197/</link>
      <pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4197/</guid>
      <description>Summary:    Product Dolibarr ERP CRM     Vendor Dolibarr   Severity High   Affected Versions &amp;lt;= 18.0.1   Tested Versions 17.0.1, 18.0.1   CVE Identifier CVE-2023-4197   CVE Description Improper input validation in Dolibarr ERP CRM &amp;lt;= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.</description>
    </item>
    
    <item>
      <title>(CVE-2023-4198) Dolibarr ERP CRM (&lt;= 17.0.3) Improper Access Control</title>
      <link>https://starlabs.sg/advisories/23/23-4198/</link>
      <pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-4198/</guid>
      <description>Summary:    Product Dolibarr ERP CRM     Vendor Dolibarr   Severity High   Affected Versions &amp;lt;= 17.0.3   Tested Versions 17.0.1, 17.0.3   CVE Identifier CVE-2023-4198   CVE Description Improper Access Control in Dolibarr ERP CRM v17.0.3 allows unauthorized users to read a database table containing sensitive third-party customers&amp;rsquo; information via the ajaxcompanies.php endpoint.   CWE Classification(s) CWE-862 Missing Authorization   CAPEC Classification(s) CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2023-30591) NodeBB Pre-Authentication Denial-of-Service</title>
      <link>https://starlabs.sg/advisories/23/23-30591/</link>
      <pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-30591/</guid>
      <description>Summary:    Product NodeBB     Vendor NodeBB   Severity High - Unprivileged attackers are able to cause NodeBB to crash and exit permanently   Affected Versions &amp;lt; v2.8.11 (Commit 82f0efb)   Tested Versions v2.8.9 (Commit fb100ac)   CVE Identifier CVE-2023-30591   CVE Description Denial-of-service in NodeBB &amp;lt;= v2.8.10 allows unauthenticated attackers to trigger a crash, when invoking eventName.startsWith() or eventName.toString(), while processing Socket.</description>
    </item>
    
    <item>
      <title>Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)</title>
      <link>https://starlabs.sg/blog/2023/09-analysis-of-nodebb-account-takeover-vulnerability-cve-2022-46164/</link>
      <pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/09-analysis-of-nodebb-account-takeover-vulnerability-cve-2022-46164/</guid>
      <description>Back in January 2023, I tasked one of our web security interns, River Koh (@oceankex), to perform n-day analysis of CVE-2022-46164 as part of his internship with STAR Labs. The overall goal is to perform an objective assessment of the vulnerability based on the facts gathered. In addition, I challenged him to reproduce the vulnerability without referencing any other materials besides the textual contents of the official advisory by NodeBB.</description>
    </item>
    
    <item>
      <title>[P2O Vancouver 2023] SharePoint Pre-Auth RCE chain (CVE-2023–29357 &amp; CVE-2023–24955)</title>
      <link>https://starlabs.sg/blog/2023/09-sharepoint-pre-auth-rce-chain/</link>
      <pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/09-sharepoint-pre-auth-rce-chain/</guid>
      <description>Brief I may have achieved successful exploitation of a SharePoint target during Pwn2Own Vancouver 2023. While the live demonstration lasted only approximately 30 seconds, it is noteworthy that the process of discovering and crafting the exploit chain consumed nearly a year of meticulous effort and research to complete the full exploit chain.
This exploit chain leverages two vulnerabilities to achieve pre-auth remote code execution (RCE) on the SharePoint server:
 Authentication Bypass &amp;ndash; An unauthenticated attacker can impersonate as any SharePoint user by spoofing valid JSON Web Tokens (JWTs), using the none signing algorithm to subvert signature validation checks when verifying JWT tokens used for OAuth authentication.</description>
    </item>
    
    <item>
      <title>nftables Adventures: Bug Hunting and N-day Exploitation (CVE-2023-31248)</title>
      <link>https://starlabs.sg/blog/2023/09-nftables-adventures-bug-hunting-and-n-day-exploitation/</link>
      <pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/09-nftables-adventures-bug-hunting-and-n-day-exploitation/</guid>
      <description>During my internship, I have been researching and trying to find bugs within the nftables subsystem. In this blog post, I will talk about a bug I have found, as well as the exploitation of an n-day discovered by Mingi Cho &amp;ndash; CVE-2023-31248.
Introduction to nftables nftables is a modern packet filtering framework that aims to replace the legacy {ip,ip6,arp,eb}_tables (xtables) infrastructure. It reuses the existing netfilter hooks, which act as entry points for handlers that perform various operations on packets.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2315) Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2</title>
      <link>https://starlabs.sg/advisories/23/23-2315/</link>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2315/</guid>
      <description>Summary:    Product OpenCart     Vendor OpenCart   Severity High - Adversaries may exploit software vulnerabilities to empty any file on the server with write permissions.   Affected Versions 4.0.0.0 - 4.0.2.2   Tested Version(s) 4.0.2.2   CVE Identifier CVE-2023-2315   CVE Description Path traversal in Opencart versions 4.0.0.0 to 4.0.2.2 allows authenticated backend users to empty any existing file on the server with write permissions.</description>
    </item>
    
    <item>
      <title>(CVE-2023-32523) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&lt;= Critical Patch 3) Unauthenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32523/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-32523/</guid>
      <description>Summary:    Product Trend Micro Mobile Security (Enterprise) 9.8 SP5     Vendor Trend Micro   Severity Critical   Affected Versions Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3)   Tested Version(s) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (Critical Patch 3)   CVE Identifier CVE-2023-32523   CVE Description Improper implementation of the authentication mechanism results in authentication bypass for affected installations of Trend Micro Mobile Security (Enterprise) 9.</description>
    </item>
    
    <item>
      <title>(CVE-2023-32524) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&lt;= Critical Patch 3) Unauthenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32524/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-32524/</guid>
      <description>Summary:    Product Trend Micro Mobile Security (Enterprise) 9.8 SP5     Vendor Trend Micro   Severity Critical   Affected Versions Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3)   Tested Version(s) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (Critical Patch 3)   CVE Identifier CVE-2023-32524   CVE Description Improper implementation of the authentication mechanism results in authentication bypass for affected installations of Trend Micro Mobile Security (Enterprise) 9.</description>
    </item>
    
    <item>
      <title>(CVE-2023-32529) Trend Micro Apex Central 2019 (&lt;= Build 6016) Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32529/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-32529/</guid>
      <description>Summary:    Product Trend Micro Apex Central 2019     Vendor Trend Micro   Severity High   Affected Versions Apex Central 2019 Build &amp;lt;= 6016   Tested Version(s) Apex Central 2019 Build 6016   CVE Identifier CVE-2023-32529   CVE Description Missing input validation in Apex Central 2019 Build 6016 and below uses user-supplied certificate values to construct a part of a SQL query that is executed in the DeleteCertById() function.</description>
    </item>
    
    <item>
      <title>(CVE-2023-32530) Trend Micro Apex Central 2019 (&lt;= Build 6016) Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32530/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-32530/</guid>
      <description>Summary:    Product Trend Micro Apex Central 2019     Vendor Trend Micro   Severity High   Affected Versions Apex Central 2019 Build &amp;lt;= 6016   Tested Version(s) Apex Central 2019 Build 6016   CVE Identifier CVE-2023-32530   CVE Description Missing input validation in Apex Central 2019 Build 6016 and below uses user-supplied certificate values to construct a part of a SQL query that is executed in the AddCert() function.</description>
    </item>
    
    <item>
      <title>(CVE-2023-38624) Trend Micro Apex Central 2019 (&lt;= Build 6394) Authenticated SSRF</title>
      <link>https://starlabs.sg/advisories/23/23-38624/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-38624/</guid>
      <description>Summary:    Product Trend Micro Apex Central 2019     Vendor Trend Micro   Severity High   Affected Versions Apex Central 2019 Build &amp;lt;= 6394   Tested Version(s) Apex Central 2019 Build 6394   CVE Identifier CVE-2023-38624   CVE Description Missing input validation in Apex Central 2019 Build 6394 and below uses user-supplied values to perform a server-side request in a function in modTMSL.</description>
    </item>
    
    <item>
      <title>(CVE-2023-38625) Trend Micro Apex Central 2019 (&lt;= Build 6394) Authenticated SSRF</title>
      <link>https://starlabs.sg/advisories/23/23-38625/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-38625/</guid>
      <description>Summary:    Product Trend Micro Apex Central 2019     Vendor Trend Micro   Severity High   Affected Versions Apex Central 2019 Build &amp;lt;= 6394   Tested Version(s) Apex Central 2019 Build 6394   CVE Identifier CVE-2023-38625   CVE Description Missing input validation in Apex Central 2019 Build 6394 and below uses user-supplied values to perform a server-side request in a function in modDeepSecurity.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2110) Obsidian Local File Disclosure</title>
      <link>https://starlabs.sg/advisories/23/23-2110/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2110/</guid>
      <description>Summary:    Product Obsidian     Vendor Obsidian   Severity High   Affected Versions Obsidian &amp;lt; 1.2.8   Tested Versions Obsidian 1.1.16   CVE Identifier CVE-2023-2110   CVE Description Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;app://local/&amp;lt;absolute-path&amp;gt;&amp;rdquo;. This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2316) Typora Local File Disclosure</title>
      <link>https://starlabs.sg/advisories/23/23-2316/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2316/</guid>
      <description>Summary:    Product Typora     Vendor Typora   Severity Medium   Affected Versions Typora for Windows/Linux &amp;lt; 1.6.7   Tested Versions Typora for Windows 1.5.12, Typora for Linux 1.5.10   CVE Identifier CVE-2023-2316   CVE Description Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;typora://app/&amp;lt;absolute-path&amp;gt;&amp;rdquo;.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2317) Typora DOM-Based Cross-site Scripting leading to Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-2317/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2317/</guid>
      <description>Summary:    Product Typora     Vendor Typora   Severity High   Affected Versions Typora for Windows/Linux &amp;lt; 1.6.7   Tested Versions Typora for Windows 1.5.12, Typora for Linux 1.5.10   CVE Identifier CVE-2023-2317   CVE Description DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading &amp;ldquo;typora://app/typemark/updater/update.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2318) MarkText DOM-Based Cross-site Scripting leading to Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-2318/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2318/</guid>
      <description>Summary:    Product MarkText     Vendor MarkText   Severity High   Affected Versions MarkText &amp;lt;= 0.17.1   Tested Versions MarkText 0.17.1   CVE Identifier CVE-2023-2318   CVE Description DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2971) Typora Local File Disclosure (Patch Bypass)</title>
      <link>https://starlabs.sg/advisories/23/23-2971/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2971/</guid>
      <description>Summary:    Product Typora     Vendor Typora   Severity Medium   Affected Versions Typora for Windows/Linux &amp;lt; 1.7.0-dev   Tested Versions Typora for Windows 1.6.7, Typora for Linux 1.6.6   CVE Identifier CVE-2023-2971   CVE Description Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;typora://app/typemark/&amp;rdquo;.</description>
    </item>
    
    <item>
      <title>Under The Hood - Disassembling of IKEA-Sonos Symfonisk Speaker Lamp</title>
      <link>https://starlabs.sg/blog/2023/08-ikea-sonos-symfonisk-speaker-lamp-teardown/</link>
      <pubDate>Tue, 01 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/08-ikea-sonos-symfonisk-speaker-lamp-teardown/</guid>
      <description>We are excited to embark on a series of teardowns to explore the inner workings of various devices. In this particular teardown, our focus will be on the 1st-Generation of IKEA-SONOS SYMFONISK Speaker Lamp, unraveling its captivating inner workings.
Please note that due to prior testing, certain screws, wires, and components have been temporarily removed from the appliance and may not be present during this analysis. However, for the purpose of this exercise, we have meticulously reassembled the SYMFONISK to its approximate original state.</description>
    </item>
    
    <item>
      <title>A new method for container escape using file-based DirtyCred</title>
      <link>https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/</link>
      <pubDate>Tue, 25 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/</guid>
      <description>Recently, I was trying out various exploitation techniques against a Linux kernel vulnerability, CVE-2022-3910. After successfully writing an exploit which made use of DirtyCred to gain local privilege escalation, my mentor Billy asked me if it was possible to tweak my code to facilitate a container escape by overwriting /proc/sys/kernel/modprobe instead.
The answer was more complicated than expected; this led me down a long and dark rabbit hole&amp;hellip;
In this post, I will discuss the root cause of the vulnerability, as well as the various methods I used to exploit it.</description>
    </item>
    
    <item>
      <title>prctl anon_vma_name: An Amusing Linux Kernel Heap Spray</title>
      <link>https://starlabs.sg/blog/2023/07-prctl-anon_vma_name-an-amusing-heap-spray/</link>
      <pubDate>Tue, 25 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/07-prctl-anon_vma_name-an-amusing-heap-spray/</guid>
      <description>TLDR prctl PR_SET_VMA (PR_SET_VMA_ANON_NAME) can be used as a (possibly new!) heap spray method targeting the kmalloc-8 to kmalloc-96 caches. The sprayed object, anon_vma_name, is dynamically sized, and can range from larger than 4 bytes to a maximum of 84 bytes. The object can be easily allocated and freed via the prctl syscall, and leaked information can be obtained via reading the proc/pid/maps file. The advantage of this method is that it does not require a cross-cache attack from cg/other caches (unlike other objects such as msg_msg) as anon_vma_name is allocated with the GFP_KERNEL flag.</description>
    </item>
    
    <item>
      <title>(CVE-2023-3513) RazerCentralService unsafe deserialization Escalation of Privilege Vulnerability</title>
      <link>https://starlabs.sg/advisories/23/23-3513/</link>
      <pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-3513/</guid>
      <description>Summary    Product Razer CentralService     Vendor Razer   Severity High - Adversaries may exploit software vulnerabilities to obtain privilege escalation.   Affected Versions Razer Central 7.11.0.558 and below   Tested Versions Razer Central 7.8.0.381 to 7.11.0.558   CVE Identifier CVE-2023-3513    CVSS3.1 Scoring System Base Score: 7.8 (High)
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
   Metric Value     Attack Vector (AV) Local   Attack Complexity (AC) Low   Privileges Required (PR) low   User Interaction (UI) None   Scope (S) Unchanged   Confidentiality (C) High   Integrity (I) High   Availability (A) High    Product Overview Razer Synapse 3 is a software suite developed by Razer, a leading gaming hardware manufacturer.</description>
    </item>
    
    <item>
      <title>(CVE-2023-3514) RazerCentralSerivce unsafe NamedPipe permission Escalation of Privilege Vulnerability</title>
      <link>https://starlabs.sg/advisories/23/23-3514/</link>
      <pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-3514/</guid>
      <description>Summary    Product Razer CentralService     Vendor Razer   Severity High - Adversaries may exploit software vulnerabilities to obtain privilege escalation.   Affected Versions Razer Central 7.11.0.558 and below   Tested Versions Razer Central 7.8.0.381 to 7.11.0.558   CVE Identifier CVE-2023-3514    CVSS3.1 Scoring System Base Score: 7.8 (High)
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
   Metric Value     Attack Vector (AV) Local   Attack Complexity (AC) Low   Privileges Required (PR) low   User Interaction (UI) None   Scope (S) Unchanged   Confidentiality (C) High   Integrity (I) High   Availability (A) High    Product Overview Razer Synapse 3 is a software suite developed by Razer, a leading gaming hardware manufacturer.</description>
    </item>
    
    <item>
      <title>Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability</title>
      <link>https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/</link>
      <pubDate>Mon, 19 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/</guid>
      <description>Background The discovery and analysis of vulnerabilities is a critical aspect of cybersecurity research. Today, we will dive into CVE-2023-1829, a vulnerability in the cls_tcindex network traffic classifier found by Valis. We will explore the process of exploiting and examining this vulnerability, shedding light on the intricate details and potential consequences. We have thoroughly tested our exploit on Ubuntu 22.04 with kernel version 5.15.0-25, which was built from the official 5.</description>
    </item>
    
    <item>
      <title>The Old, The New and The Bypass - One-click/Open-redirect to own Samsung S22 at Pwn2Own 2022</title>
      <link>https://starlabs.sg/blog/2023/06-the-old-the-new-and-the-bypass-one-clickopen-redirect-to-own-samsung-s22-at-pwn2own-2022/</link>
      <pubDate>Wed, 14 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/06-the-old-the-new-and-the-bypass-one-clickopen-redirect-to-own-samsung-s22-at-pwn2own-2022/</guid>
      <description>TLDR; We began our work on Samsung immediately after the release of the Pwn2Own Toronto 2022 target list.
In this article, we will dive into the details of an open-redirect vulnerability discovered during the Pwn2Own 2022 event and how we exploited it on a Samsung S22 device. By breaking down the technical aspects and using code snippets, we aim to provide a comprehensive overview of this critical security flaw.
To begin, I revisited our team&amp;rsquo;s paper (written by Li Jiantao and Nguyễn Hoàng Thạch) from previous year, where two bugs were identified.</description>
    </item>
    
    <item>
      <title>Microsoft Exchange Powershell Remoting Deserialization leading to RCE (CVE-2023-21707)</title>
      <link>https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/</link>
      <pubDate>Fri, 28 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/</guid>
      <description>Introduction While analyzing CVE-2022-41082, also known as ProxyNotShell, we discovered this vulnerability which we have detailed in this blog. However, for a comprehensive understanding, we highly recommend reading the thorough analysis written by team ZDI.
To aid in understanding, we present a visual representation of CVE-2022-41082 below.
The sink of ProxyNotShell:
//System.Management.Automation.InternalDeserializer.ReadOneObject() internal object ReadOneObject(out string streamName) { //... Type targetTypeForDeserialization = psobject.GetTargetTypeForDeserialization(this._typeTable); //[1] if (null != targetTypeForDeserialization) { Exception ex = null; try { object obj2 = LanguagePrimitives.</description>
    </item>
    
    <item>
      <title>(CVE-2023-2017) Shopware 6 Server-side Template Injection (SSTI) via Twig Security Extension</title>
      <link>https://starlabs.sg/advisories/23/23-2017/</link>
      <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/23/23-2017/</guid>
      <description>Summary:    Product Shopware     Vendor Shopware AG   Severity High - Users with login access to Shopware Admin panel may be able to obtain remote code/command execution   Affected Versions v6.4.18.1 &amp;lt;= v6.4.20.0, v6.5.0.0-rc1 &amp;lt;= v6.5.0.0-rc4 (Commit facfc88)   Tested Versions v6.4.20.0 (Latest stable version), v6.5.0.0-rc3 (Latest pre-release version)   CVE Identifier CVE-2023-2017   CVE Description Server-side Template Injection (SSTI) in Shopware 6 (&amp;lt;= v6.</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2023</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2023/</link>
      <pubDate>Sat, 25 Mar 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2023/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2023 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 23rd March to 25th March 2022 in a hybrid format where participants are back to competing in-person and in virtual.</description>
    </item>
    
    <item>
      <title>CS-Cart PDF Plugin Unauthenticated Command Injection</title>
      <link>https://starlabs.sg/blog/2023/03-cs-cart-pdf-plugin-unauthenticated-command-injection/</link>
      <pubDate>Fri, 03 Mar 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/03-cs-cart-pdf-plugin-unauthenticated-command-injection/</guid>
      <description>Summary A command injection vulnerability exists in CS-Cart&amp;rsquo;s HTML to PDF converter (https://github.com/cscart/pdf) allowing unauthenticated attackers to achieve remote command execution (RCE). The vulnerability only affects the HTML to PDF converter service and the default hosted service at converter.cart-services.com (maintained by CS-Cart&amp;rsquo;s development team) used by the PDF converter plugin, and does not allow for RCE against base installations of CS-Cart.
Product Background In CS-Cart v4.13.2, the HTML to PDF converter is an optional plugin (disabled by default) for printing PDF documents in CS-Cart.</description>
    </item>
    
    <item>
      <title>Microsoft Azure Account Takeover via DOM-based XSS in Cosmos DB Explorer</title>
      <link>https://starlabs.sg/blog/2023/02-microsoft-azure-account-takeover-via-dom-based-xss-in-cosmos-db-explorer/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/02-microsoft-azure-account-takeover-via-dom-based-xss-in-cosmos-db-explorer/</guid>
      <description>Upon finding the vulnerability, our team member, Ngo Wei Lin (@Creastery), immediately reported it to the Microsoft Security Response Center (MSRC) on 19th March 2022, who fixed the important issue with a fix commited in the repo within seven days, which is impressive and a much faster response than other Microsoft bugs which we reported previously. The fix was pushed down to Azure Cosmos DB Explorer on 31st March 2022.</description>
    </item>
    
    <item>
      <title>STAR LABS SG PTE. LTD. has been authorized by the CVE Program as a CVE Numbering Authority (CNA)</title>
      <link>https://starlabs.sg/blog/2023/02-star-labs-has-been-authorized-by-the-cve-program-as-a-cve-numbering-authority/</link>
      <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/02-star-labs-has-been-authorized-by-the-cve-program-as-a-cve-numbering-authority/</guid>
      <description>STAR LABS SG PTE. LTD. (STAR Labs) announced today that it has become a CVE Numbering Authority (CNA) for the Common Vulnerabilities and Exposures (CVE®) system, a global cybersecurity community.
As a CNA, STAR LABS is authorized to assign CVE Identifiers（CVE IDs）to newly discovered vulnerabilities and publicly disclose information about these vulnerabilities through CVE Records. Identifying vulnerabilities with CVE IDs can speed up the awareness and understanding of those vulnerabilities, enabling security researchers and system managers to expedite solutions.</description>
    </item>
    
    <item>
      <title>Gotta KEP-tcha &#39;Em All - Bypassing Anti-Debugging methods in KEPServerEX</title>
      <link>https://starlabs.sg/blog/2023/02-gotta-kep-tcha-em-all-bypassing-anti-debugging-methods-in-kepserver/</link>
      <pubDate>Fri, 17 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/02-gotta-kep-tcha-em-all-bypassing-anti-debugging-methods-in-kepserver/</guid>
      <description>Background Lately, my focus has been on discovering any potential vulnerabilities in KEPServerEX. KEPServerEX is the industry&amp;rsquo;s leading connectivity platform that provides a single source of industrial automation data to all your applications. Users can connect, manage, monitor, and control diverse automation devices and software applications through one intuitive user interface.
This software employs multiple anti-debugging measures, making it challenging to discover any vulnerabilities and performing fuzzing on it. In this regard, I would like to share my perspective on the issue and my strategy for circumventing these measures.</description>
    </item>
    
    <item>
      <title>Dissecting the Vulnerabilities - A Comprehensive Teardown of acmailer&#39;s N-Days</title>
      <link>https://starlabs.sg/blog/2023/02-dissecting-the-vulnerabilities-a-comprehensive-teardown-of-acmailer/</link>
      <pubDate>Thu, 16 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2023/02-dissecting-the-vulnerabilities-a-comprehensive-teardown-of-acmailer/</guid>
      <description>Introduction In this post, one of our recent intern, Wang Hengyue (@w_hy_04) was given the task to analyse CVE-2021-20617 &amp;amp; CVE-2021-20618 in acmailer since there isn&amp;rsquo;t any public information on it. Today, we&amp;rsquo;ll be sharing his journey in dissecting the vulnerabilities in acmailer. Both vulnerabilities were originally found by ma.la
acmailer is a Perl-based email delivery application that provides functionality centered around sending mass emails, with associated functions such as registration and unregistration forms, surveys, and email templating.</description>
    </item>
    
    <item>
      <title>Pwn2Own Miami 2023</title>
      <link>https://starlabs.sg/achievements/p2o-miami-2023/</link>
      <pubDate>Thu, 16 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-miami-2023/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
Pwn2Own Miami was held from 14th February to 16th February 2023 in a hybrid format (offline and online).</description>
    </item>
    
    <item>
      <title>Deconstructing and Exploiting CVE-2020-6418</title>
      <link>https://starlabs.sg/blog/2022/12-deconstructing-and-exploiting-cve-2020-6418/</link>
      <pubDate>Wed, 21 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/12-deconstructing-and-exploiting-cve-2020-6418/</guid>
      <description>As part of my internship at STAR Labs, I conducted n-day analysis of CVE-2020-6418. This vulnerability lies in the V8 engine of Google Chrome, namely its optimizing compiler Turbofan. Specifically, the vulnerable version is in Google Chrome&amp;rsquo;s V8 prior to 80.0.3987.122. In this article, I will give a step-by-step analysis of the vulnerability, from the root cause to exploitation.
Background In JavaScript, objects do not have a fixed type. Instead, V8 assigns each object a Map that reflects its type.</description>
    </item>
    
    <item>
      <title>(CVE-2022-44667) Windows CDirectMusicPortDownload Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-44667/</link>
      <pubDate>Tue, 13 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-44667/</guid>
      <description>Summary    Product Microsoft DirectMusic     Vendor Microsoft   Severity High   Affected Versions Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1   Tested Versions Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1   CVE Identifier CVE-2022-44667    CVSS3.1 Scoring System Base Score: 7.8 (High)
Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
   Metric Value     Attack Vector (AV) Local   Attack Complexity (AC) Low   Privileges Required (PR) None   User Interaction (UI) Required   Scope (S) Unchanged   Confidentiality (C) High   Integrity (I) High   Availability (A) High    Product Overview Microsoft DirectMusic Core Services DLL is a dynamic link library (DLL) that is part of the DirectMusic component of the DirectX multimedia API for Windows operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2022-44668) Windows DirectMusicPortDownload Double Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-44668/</link>
      <pubDate>Tue, 13 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-44668/</guid>
      <description>Summary    Product Microsoft DirectMusic     Vendor Microsoft   Severity High   Affected Versions Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1   Tested Versions Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1   CVE Identifier CVE-2022-44668    CVSS3.1 Scoring System Base Score: 7.8 (High)
Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
   Metric Value     Attack Vector (AV) Local   Attack Complexity (AC) Low   Privileges Required (PR) None   User Interaction (UI) Required   Scope (S) Unchanged   Confidentiality (C) High   Integrity (I) High   Availability (A) High    Product Overview Microsoft DirectMusic Core Services DLL is a dynamic link library (DLL) that is part of the DirectMusic component of the DirectX multimedia API for Windows operating systems.</description>
    </item>
    
    <item>
      <title>Pwn2Own Toronto 2022</title>
      <link>https://starlabs.sg/achievements/p2o-toronto-2022/</link>
      <pubDate>Fri, 09 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-toronto-2022/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2022 fall edition of Pwn2Own (Pwn2Own Toronto) was held from 06th December to 09th December 2022 in a hybrid format (offline and online).</description>
    </item>
    
    <item>
      <title>The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022</title>
      <link>https://starlabs.sg/blog/2022/12-the-last-breath-of-our-netgear-rax30-bugs-a-tragic-tale-before-pwn2own-toronto-2022/</link>
      <pubDate>Tue, 06 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/12-the-last-breath-of-our-netgear-rax30-bugs-a-tragic-tale-before-pwn2own-toronto-2022/</guid>
      <description>Background Some time ago, we were playing with some Netgear routers and we learned so much from this target.
However, Netgear recently patched several vulnerabilities in their RAX30 router firmware, including the two vulnerabilities in the DHCP interface for the LAN side and one remote code execution vulnerability on the WAN side which we prepared for Pwn2Own Toronto 2022. This blog post focuses on the vulnerabilities found in version 1.0.7.78You can download the firmware from this link, and easily extract the firmware by using binwalk.</description>
    </item>
    
    <item>
      <title>TheHole New World - how a small leak will sink a great browser (CVE-2021-38003)</title>
      <link>https://starlabs.sg/blog/2022/12-the-hole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003/</link>
      <pubDate>Tue, 06 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/12-the-hole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003/</guid>
      <description>Introduction CVE-2021-38003 is a vulnerability that exists in the V8 Javascript engine. The vulnerability affects the Chrome browser before stable version 95.0.4638.69, and was disclosed in October 2021 in google&amp;rsquo;s chrome release blog, while the bug report was made public in February 2022.
The vulnerability will cause a special value in V8 called TheHole being leaked to the script. This can lead to a renderer RCE in a Chromium-based browser, and has been used in the wild.</description>
    </item>
    
    <item>
      <title>Multiple Vulnerabilities in Proxmox VE &amp; Proxmox Mail Gateway</title>
      <link>https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/</link>
      <pubDate>Fri, 02 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/</guid>
      <description>Background Proxmox Virtual Environment (Proxmox VE or PVE) is an open-source type-1 hypervisor. It includes a web-based management interface programmed in Perl. Another Proxmox product written in Perl, Proxmox Mail Gateway (PMG), comes with a similar web management interface. They share some of the codebases.
In this article, I will introduce how to debug PVE&amp;rsquo;s web service step-by-step and analyse three bugs I have found in PVE and PMG.
[UPDATE] This is a quick and minor update to this blog post.</description>
    </item>
    
    <item>
      <title>Microsoft SharePoint Server Post-Authentication Server-Side Request Forgery vulnerability</title>
      <link>https://starlabs.sg/blog/2022/10-sharepoint-post-authenticated-ssrf-vulnerability/</link>
      <pubDate>Tue, 25 Oct 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/10-sharepoint-post-authenticated-ssrf-vulnerability/</guid>
      <description>Overview Disclaimer: No anime characters or animals were harmed during the research. The bug had been fixed but it did not meet that criterion required to get CVE.
Recently, we have found a Server-Side Request Forgery (SSRF) in Microsoft SharePoint Server 2019 which allows remote authenticated users to send HTTP(S) requests to arbitrary URL and read the responses. The endpoint &amp;lt;site&amp;gt;/_api/web/ExecuteRemoteLOB is vulnerable to Server-Side Request Forgery (SSRF). The HTTP(S) request is highly customizable in request method, path, headers and bodies.</description>
    </item>
    
    <item>
      <title>MSRC 2022 Q3 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-q3-2022/</link>
      <pubDate>Mon, 24 Oct 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-q3-2022/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that our researcher, Lê Hữu Quang Linh (#9), has been shortlisted for the 2022 Q3&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2022/10/24/congratulations-to-the-top-msrc-2022-q3-security-researchers/  </description>
    </item>
    
    <item>
      <title>Apple CoreText - An Unexpected Journey to Learn about Failure</title>
      <link>https://starlabs.sg/blog/2022/09-apple-coretext-an-unexpected-journey-to-learn-about-failure/</link>
      <pubDate>Thu, 29 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/09-apple-coretext-an-unexpected-journey-to-learn-about-failure/</guid>
      <description>Late last year, I have focused my research on the CoreText framework for 2-3 months. In particular, the code related to the text shaping engine and the code responsible for parsing the AAT tables.
During this research, I found an OOB (Out-Of-Bounds) Write in the morx table. This series of writeups is to document my whole process, from selecting this attack surface to finding the bug to writing an exploit for it in Safari.</description>
    </item>
    
    <item>
      <title>Step-by-Step Walkthrough of CVE-2022-32792 - WebKit B3ReduceStrength Out-of-Bounds Write</title>
      <link>https://starlabs.sg/blog/2022/09-step-by-step-walkthrough-of-cve-2022-32792/</link>
      <pubDate>Thu, 08 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/09-step-by-step-walkthrough-of-cve-2022-32792/</guid>
      <description>Recently, ZDI released the advisory for a Safari out-of-bounds write vulnerability exploited by Manfred Paul (@_manfp) in Pwn2Own. We decided to take a look at the patch and try to exploit it.
The patch is rather simple: it creates a new function (IntRange::sExt) that is used to decide the integer range after applying a sign extension operation (in rangeFor). Before this patch, the program assumes that the range stays the same after applying sign extension.</description>
    </item>
    
    <item>
      <title>Exploiting WebKit JSPropertyNameEnumerator Out-of-Bounds Read (CVE-2021-1789)</title>
      <link>https://starlabs.sg/blog/2022/08-exploiting-webkit-jspropertynameenumerator-out-of-bounds-read-cve-2021-1789/</link>
      <pubDate>Fri, 19 Aug 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/08-exploiting-webkit-jspropertynameenumerator-out-of-bounds-read-cve-2021-1789/</guid>
      <description>Initially, our team member, Đỗ Minh Tuấn, wanted to write about the RCA (Root Cause Analysis) of CVE-2021-1870 which APT used. But Maddie Stone pointed it to us that it was actually CVE-2021-1789. None-the-less, we would still want to share with everyone the analysis done by Đỗ Minh Tuấn.
The bug is assigned CVE-2021-1789 in security content of Safari 14.0.3. We successfully exploited it on WebKitGTK &amp;lt;= 2.30.5 or equivalent on WebKit.</description>
    </item>
    
    <item>
      <title>MSRC 2022 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-leaderboard-2022/</link>
      <pubDate>Tue, 09 Aug 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-leaderboard-2022/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that our researcher, Ngo Wei Lin (#48), has been shortlisted for this year&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2022/08/08/congratulations-to-the-msrc-2022-most-valuable-researchers/ https://twitter.com/msftsecresponse/status/1556696085665501185  </description>
    </item>
    
    <item>
      <title>Gitlab Project Import RCE Analysis (CVE-2022-2185)</title>
      <link>https://starlabs.sg/blog/2022/07-gitlab-project-import-rce-analysis-cve-2022-2185/</link>
      <pubDate>Thu, 21 Jul 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/07-gitlab-project-import-rce-analysis-cve-2022-2185/</guid>
      <description>At the beginning of this month, GitLab released a security patch for versions 14-&amp;gt;15. Interestingly in the advisory, there was a mention of a post-auth RCE bug with CVSS 9.9.
The bug exists in GitLab&amp;rsquo;s Project Imports feature, which was found by @vakzz. Incidentally, when I rummaged in the author&amp;rsquo;s h1 profile. I discovered that four months ago, he also found a bug in the import project feature:
Initially, I thought it was tempting after seeing the bounty, so I started learning Rails and debugged this bug!</description>
    </item>
    
    <item>
      <title>(CVE-2022-26438) Asus System Control Interface Backup Local Privilege Escalation (LPE)</title>
      <link>https://starlabs.sg/advisories/22/22-36438/</link>
      <pubDate>Wed, 13 Jul 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-36438/</guid>
      <description>Summary:    Product Asus System Control Interface     Vendor Asus   Severity High - Adversaries may exploit this software vulnerability to set weak file permissions, leading to local privilege escalation.   Affected Versions MyASUS: 3.1.5.0 ASUS System Control Interface: 3.1.4.0 File Version: 1.0.9.0 (AsusSwitch.exe)   Tested Versions MyASUS: 3.1.5.0 ASUS System Control Interface: 3.1.4.0 File Version: 1.0.9.0 (AsusSwitch.exe)   CVE Identifier CVE-2022-26438   CWE CWE-276 - Incorrect Default Permissions    CVSS3.</description>
    </item>
    
    <item>
      <title>(CVE-2022-26439) Asus System Control Interface Software Update Arbitrary File Deletion</title>
      <link>https://starlabs.sg/advisories/22/22-36439/</link>
      <pubDate>Wed, 13 Jul 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-36439/</guid>
      <description>Summary:    Product Asus System Control Interface     Vendor Asus   Severity Medium - Adversaries may exploit this software vulnerability to set weak file permissions, leading to local privilege escalation.   Affected Versions MyASUS: 3.1.5.0ASUS System Control Interface: 3.1.4.0File Version: 1.0.52.0 (AsusSoftwareManager.exe)1.0.44.0 (AsusLiveUpdate.dll)   Tested Versions MyASUS: 3.1.5.0ASUS System Control Interface: 3.1.4.0File Version: 1.0.52.0 (AsusSoftwareManager.exe)1.0.44.0 (AsusLiveUpdate.dll)   CVE Identifier CVE-2022-26439   CWE     CVSS3.</description>
    </item>
    
    <item>
      <title>io_uring - new code, new bugs, and a new exploit technique</title>
      <link>https://starlabs.sg/blog/2022/06-io_uring-new-code-new-bugs-and-a-new-exploit-technique/</link>
      <pubDate>Fri, 24 Jun 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/06-io_uring-new-code-new-bugs-and-a-new-exploit-technique/</guid>
      <description>For the past few weeks, I have been working on conducting N-day analysis and bug hunting in the io_uring subsystem of the Linux kernel with the guidance of my mentors, Billy and Ramdhan.
In this article, I will briefly discuss the io_uring subsystem, as well as my approach to discovering and developing a new kernel exploit technique during my N-day analysis of CVE-2021-41073. I will also discuss two bugs I found while analyzing a new io_uring feature.</description>
    </item>
    
    <item>
      <title>Trying To Exploit A Windows Kernel Arbitrary Read Vulnerability</title>
      <link>https://starlabs.sg/blog/2022/06-trying-to-exploit-a-windows-kernel-arbitrary-read-vulnerability/</link>
      <pubDate>Tue, 07 Jun 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/06-trying-to-exploit-a-windows-kernel-arbitrary-read-vulnerability/</guid>
      <description>Introduction I recently discovered a very interesting kernel vulnerability that allows the reading of arbitrary kernel-mode address. Sadly, the vulnerability was patched in Windows 21H2 (OS Build 22000.675), and I am unsure of the CVE being assigned to it. In this short blog post, I will share my journey of trying to exploit this vulnerability. Although I didn&amp;rsquo;t finish the exploit in the end, I have decided to share this with everyone anyway.</description>
    </item>
    
    <item>
      <title>New Wine in Old Bottle - Microsoft Sharepoint Post-Auth Deserialization RCE (CVE-2022-29108)</title>
      <link>https://starlabs.sg/blog/2022/05-new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108/</link>
      <pubDate>Thu, 12 May 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/05-new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108/</guid>
      <description>Introduction Recently, I have had a some work which is related to Sharepoint, so I was learning on how to setup and debug old bugs of Sharepoint.
In February, there was a Deserialization bug CVE-2022-22005 (post-auth of course). There is already a detailed analysis blog post about that written by a Vietnamese guy (here). The blog is written with great enthusiasm and detail. I also rely on the details in that blog to setup and debug.</description>
    </item>
    
    <item>
      <title>(CVE-2021-4206) QEMU QXL Integer overflow leads to Heap Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-4206/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-4206/</guid>
      <description>CVE: CVE-2021-4206
Tested Versions:
 QEMU &amp;lt; v6.0.0  Product URL(s): https://www.qemu.org/
Description of the vulnerability Technical Details QXL, the QEMU QXL video accelerator, is a para-virtualized framebuffer device for the SPICE protocol. It is the default video device when we create a VM from virt-manager. It exposes the RAMs and I/O ports to let guest communicate with it.
00:01.0 VGA compatible controller: Red Hat, Inc. QXL paravirtual graphic card (rev 04) (prog-if 00 [VGA controller])Subsystem: Red Hat, Inc.</description>
    </item>
    
    <item>
      <title>(CVE-2021-4207) QEMU QXL Integer overflow leads to Heap Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-4207/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-4207/</guid>
      <description>CVE: CVE-2021-4207
Tested Versions:
 QEMU &amp;lt; v6.0.0  Product URL(s): https://www.qemu.org/
Description of the vulnerability Technical Details QXL, the QEMU QXL video accelerator, is a para-virtualized framebuffer device for the SPICE protocol. It is the default video device when we create a VM from virt-manager. It exposes the RAMs and I/O ports to let guest communicate with it.
00:01.0 VGA compatible controller: Red Hat, Inc. QXL paravirtual graphic card (rev 04) (prog-if 00 [VGA controller])Subsystem: Red Hat, Inc.</description>
    </item>
    
    <item>
      <title>(CVE-2022-0168) Linux Kernel smb2_ioctl_query_info NULL Pointer Dereference</title>
      <link>https://starlabs.sg/advisories/22/22-0168/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-0168/</guid>
      <description>CVE: CVE-2022-0168
Tested Versions:
 Linux kernels 5.4–5.12, 5.13-rc+HEAD  Description of the vulnerability Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server. Linux can use the ioctl system call on CIFS file for query information. In the function smb2_ioctl_query_info, it incorrectly verify the return from the memdup_user function [2].</description>
    </item>
    
    <item>
      <title>(CVE-2022-0216) QEMU LSI SCSI Use After Free</title>
      <link>https://starlabs.sg/advisories/22/22-0216/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-0216/</guid>
      <description>CVE: CVE-2022-0216
Tested Versions:
 QEMU &amp;lt; v6.0.0  Product URL(s):
 https://www.qemu.org/  Description of the vulnerability Technical Details The vulnerability resides in the hw/scsi/lsi53c895a.c specifically in lsi_do_msgout function. lsi_do_msgout function is used to receive messages from the OS, and do something based on that message. In this case, one message only has one-byte size.
static void lsi_do_msgout(LSIState *s) { uint8_t msg; int len; uint32_t current_tag; lsi_request *current_req, *p, *p_next; if (s-&amp;gt;current) { current_tag = s-&amp;gt;current-&amp;gt;tag; current_req = s-&amp;gt;current; // [1]  } else { current_tag = s-&amp;gt;select_tag; current_req = lsi_find_by_tag(s, current_tag); } trace_lsi_do_msgout(s-&amp;gt;dbc); while (s-&amp;gt;dbc) { // s-&amp;gt;dbc is controlled  msg = lsi_get_msgbyte(s); s-&amp;gt;sfbr = msg; switch (msg) { .</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2022</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2022/</link>
      <pubDate>Tue, 22 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2022/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2022 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 18th March to 20th March 2022 in a hybrid format where participants are back to competing in-person and in virtual due to the ongoing COVID-19 pandemic that has limited some contestants&amp;rsquo; traveling operations.</description>
    </item>
    
    <item>
      <title>(CVE-2022-28730) Apache JSPWiki v2.11.1 - Reflected XSS in AjaxPreview.jsp</title>
      <link>https://starlabs.sg/advisories/22/22-28730/</link>
      <pubDate>Mon, 14 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-28730/</guid>
      <description>CVE: CVE-2022-28730
Tested Versions:
 Latest release v2.11.2  CVSSv3.1 Base Score: 5.4 (Medium)
CVSSv3.1 String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Product URL(s):
 https://github.com/apache/jspwiki/  Description of the vulnerability Due to the lack of sanitzation before displaying the rendered preview to the user resulted in a Reflected XSS vulnerability at the AJAXPreview.jsp end-point. As a result, an unauthenticated attacker is able to execute arbitrary JavaScript code by deceiving an authenticated Admin user to trigger a specially crafted payload, resulting in potential state-changing actions being carried out.</description>
    </item>
    
    <item>
      <title>(CVE-2022-26718) macOS smbfs Out-of-Bounds Read due to parse nic info</title>
      <link>https://starlabs.sg/advisories/22/22-26718/</link>
      <pubDate>Fri, 04 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-26718/</guid>
      <description>CVE: CVE-2022-26718
Tested Versions:
 macOS 11.x.x &amp;lt;= 11.6.4 macOS 12.x.x &amp;lt;= 12.2.1  Product URL(s):
 https://www.apple.com/  Description of the vulnerability smbfs stands for Samba file system of macOS, which is used for communication and linking with Samba file server. smbfs allows users to connect a remote shared folder to Finder.
smbfs is a macOS driver containing two components one is netsmb and the other one is smbfs, this driver also has public open source at this link but it is only available for macOS 11.</description>
    </item>
    
    <item>
      <title>MSRC 2021 Q4 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-q4-2021/</link>
      <pubDate>Tue, 01 Feb 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-q4-2021/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that our researcher, Ngo Wei Lin (#18), has been shortlisted for the 2021 Q4&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2022/02/01/congratulations-to-the-top-msrc-2021-q4-security-researchers/  </description>
    </item>
    
    <item>
      <title>The Cat Escaped from the Chrome Sandbox</title>
      <link>https://starlabs.sg/blog/2022/01-the-cat-escaped-from-the-chrome-sandbox/</link>
      <pubDate>Fri, 21 Jan 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2022/01-the-cat-escaped-from-the-chrome-sandbox/</guid>
      <description>Introduction On 13th September 2021, Google published the security advisory for Google Chrome. That advisory states that Google is aware of two vulnerabilities exploited in the wild, CVE-2021-30632 as RCE and CVE-2021-30633 as Sandbox Escape.
In this post, I will talk about the bypass sandbox vulnerability CVE-2021-30633. Man Yue Mo had published a very detailed blog post explaining CVE-2021-30632, which is a Type Confusion bug that leads to RCE in Chrome.</description>
    </item>
    
    <item>
      <title>(CVE-2022-21877) Storage Spaces Controller Information Disclosure Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-21877/</link>
      <pubDate>Tue, 11 Jan 2022 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/22/22-21877/</guid>
      <description>Summary    Product Storage Spaces     Vendor Microsoft   Severity Medium   Affected Versions spaceport.sys in Windows 10 and Windows Server 2019   Tested Versions spaceport.sys in Windows 10 and Windows Server 2019   CVE Identifier CVE-2022-21877    CVSS3.1 Scoring System Base Score: 5.5 (Medium)
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
   Metric Value     Attack Vector (AV) Local   Attack Complexity (AC) Low   Privileges Required (PR) Low   User Interaction (UI) None   Scope (S) Unchanged   Confidentiality (C) High   Integrity (I) None   Availability (A) None    Product Overview Storage Spaces is a technology in Windows and Windows Server that can help protect your data from drive failures.</description>
    </item>
    
    <item>
      <title>Diving into Open-source LMS Codebases</title>
      <link>https://starlabs.sg/blog/2021/11-diving-into-open-source-lms-ccodebases/</link>
      <pubDate>Tue, 16 Nov 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/11-diving-into-open-source-lms-ccodebases/</guid>
      <description>Introduction Looking to practice on source code review, I had been diving into how open-source LMS codebases are structured in order to find undiscovered vulnerabilities. Initially, my main focus had been on Chamilo LMS (their source code can be found on GitHub). Afterwards, I looked into Moodle LMS (their source code can also be found on GitHub).
The majority of the findings that were found are the ones you would think of when you hear the words &amp;ldquo;common web application vulnerabilities&amp;rdquo;, such as:</description>
    </item>
    
    <item>
      <title>Pwn2Own Austin 2021</title>
      <link>https://starlabs.sg/achievements/p2o-austin-2021/</link>
      <pubDate>Thu, 04 Nov 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-austin-2021/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2021 fall edition of Pwn2Own (Pwn2Own Vancouver) was held from 02nd November to 04th November 2021 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.</description>
    </item>
    
    <item>
      <title>TianFu Cup 2021</title>
      <link>https://starlabs.sg/achievements/tianfu-cup-2021/</link>
      <pubDate>Sun, 17 Oct 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/tianfu-cup-2021/</guid>
      <description>The &amp;ldquo;Tianfu Cup&amp;rdquo; International Cyber Security Competition is China&amp;rsquo;s version of Hacking competition, for all security practitioners. With the target of gradually creating China&amp;rsquo;s own &amp;ldquo;Pwn2Own&amp;rdquo;, Tianfu Cup International PWN Contest will have three independent and parallel events: the original vulnerability demonstration and recurrence contest, the product Contest, and the system Contest. All teams are required to use original vulnerabilities to hack the given subject.
Today, we are proud to announce that our researchers, Billy Jheng Bing-Jhong &amp;amp; Muhammad Alifa Ramdhan, have successfully Pwned Qemu twice.</description>
    </item>
    
    <item>
      <title>MSRC 2021 Q3 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-q3-2021/</link>
      <pubDate>Thu, 14 Oct 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-q3-2021/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that our researcher, Ngo Wei Lin (#27), has been shortlisted for the 2021 Q3&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2021/10/14/congratulations-to-the-top-msrc-2021-q3-security-researchers/  </description>
    </item>
    
    <item>
      <title>Analysis of CVE-2021-1758 (CoreText Out-Of-Bounds Read)</title>
      <link>https://starlabs.sg/blog/2021/09-analysis-of-cve-2021-1758/</link>
      <pubDate>Tue, 14 Sep 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/09-analysis-of-cve-2021-1758/</guid>
      <description>References:
 STARLabs Advisory STAR-21-1758  In February, Peter found a OOB read vulnerability in libFontParser.dylib. The latest tested version with the vulnerability is macOS Catalina 10.15.4 (19E287).
I wrote a guide earlier on setting up a testing environment.
Mac Resource Fork Font File References:
 Font Forge: Macintosh Font Formats Apple: MoreMacintoshToolbx fontTools: macRes  It turns out that macOS can load something called a Mac Resource Fork font file.</description>
    </item>
    
    <item>
      <title>(CVE-2021-30844) macOS smbfs Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-30844/</link>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-30844/</guid>
      <description>CVE: CVE-2021-30844
Tested Versions:
 macOS BigSur 11.0 - 11.2.3  Product URL(s):
 https://apple.com  Description of the vulnerability smbfs is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in smbfs, which allows an attacker to leak kernel memory to achieve further exploitation.
The bug occurs on the SMBIOC_T2RQ ioctl handler. This handler first process user-mode input on function smb_usr_t2request
int smb_usr_t2request(struct smb_share *share, struct smbioc_t2rq *dp, vfs_context_t context) { //.</description>
    </item>
    
    <item>
      <title>(CVE-2021-30845) macOS smbfs Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-30845/</link>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-30845/</guid>
      <description>CVE: CVE-2021-30845
Tested Versions:
 macOS BigSur 11.0 - 11.2.3  Product URL(s):
 https://apple.com/  Description of the vulnerability smbfs is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in smbfs, which allows an attacker to leak kernel memory to achieve further exploitation.
The vulnerability exists in the smbfs_mount function, which can be triggered via mount syscall. mount syscall will take data from user input and pass it to smbfs_mount.</description>
    </item>
    
    <item>
      <title>MSRC 2020 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-leaderboard-2020/</link>
      <pubDate>Thu, 05 Aug 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-leaderboard-2020/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that two of our researchers, Meysam Firouzi (#40) and Shi Ji (#54), have been shortlisted for this year&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2020/08/05/announcing-2020-msrc-most-valuable-security-researchers/  </description>
    </item>
    
    <item>
      <title>Identifying Bugs in Router Firmware at Scale with Taint Analysis</title>
      <link>https://starlabs.sg/blog/2021/08-identifying-bugs-in-router-firmware-at-scale-with-taint-analysis/</link>
      <pubDate>Wed, 04 Aug 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/08-identifying-bugs-in-router-firmware-at-scale-with-taint-analysis/</guid>
      <description>In the past few months, Akash (@enigmatrix) and I (@daniellimws) worked on developing a taint analysis tool to find bugs in routers, with the guidance of Shi Ji (@puzzor) and Thach (@d4rkn3ss). We had developed a tool based on CVE-2019-8312 to CVE-2019-8319, which are command injection vulnerabilities on the D-Link DIR-878 router with firmware version 1.12A1. The goal was to automate the detection of such bugs. Ideally, the tool should be faster than finding the bugs manually.</description>
    </item>
    
    <item>
      <title>MSRC 2021 Q2 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-mvp-q2-2021/</link>
      <pubDate>Thu, 15 Jul 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/msrc-mvp-q2-2021/</guid>
      <description>MSRC Most Valuable Security Researchers is an annual program of Microsoft which offers public thanks and acknowledgement to the researchers who help protect their customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.
Today, we are proud to announce that our researcher, Lê Hữu Quang Linh (#24), has been shortlisted for the 2021 Q2&amp;rsquo;s Microsoft Most Valuable Security Researchers (MVRs).
References  https://msrc-blog.microsoft.com/2021/07/15/announcing-the-top-msrc-2021-q2-security-researchers-congratulations/  </description>
    </item>
    
    <item>
      <title>Simple Vulnerability Regression Monitoring with V8Harvest</title>
      <link>https://starlabs.sg/blog/2021/06-simple-vulnerability-regression-monitoring-with-v8harvest/</link>
      <pubDate>Fri, 25 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/06-simple-vulnerability-regression-monitoring-with-v8harvest/</guid>
      <description>Introduction During my research into Javascript Engine (V8), I have created a small tool to help you view recent V8 bugs that contains regression test on a single page. Since most of the time, regression test often contains PoC to trigger the bug, it’s pretty useful to analyze them to find the root cause and writing exploit for the n-day bug.
For example, regress-1053604.js contains the PoC to trigger the side-effect in kJSCreate opcode (CVE-2020-6418).</description>
    </item>
    
    <item>
      <title>(CVE-2021-30868) macOS smbfs Race Condition leading to Use-After-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-30868/</link>
      <pubDate>Fri, 18 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-30868/</guid>
      <description>CVE: CVE-2021-30868
Tested Versions:
 macOS BigSur 11.0 - 11.2.3  Product URL(s):
 https://apple.com/  Description of the vulnerability smbfs is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in smbfs, which allows attacker can escalate from user permission into root privilege.
smbfs kext was implemented with chardev device styles. User can interact with smbfs kext via ioctl syscall to do some task.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35400) Prolink PRC2402M mesh.cgi get_extender_page Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35400/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35400/</guid>
      <description>CVE: CVE-2021-35400
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by mesh.cgi, which is passed to popen, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes GET requests to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35401) Prolink PRC2402M login.cgi sys_login Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35401/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35401/</guid>
      <description>CVE: CVE-2021-35401
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by login.cgi, which is passed to popen, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes POST requests through HTML forms to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35403) Prolink PRC2402M touchlist_sync.cgi main Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35403/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35403/</guid>
      <description>CVE: CVE-2021-35403
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by touchlist_sync.cgi, which is passed to popen, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes GET requests to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35404) Prolink PRC2402M applogin.cgi sys_login1 Authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35404/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35404/</guid>
      <description>CVE: CVE-2021-35404
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by applogin.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
Authentication is required to exploit this vulnerability.
The router makes GET requests through HTML forms to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35406) Prolink PRC2402M login.cgi sys_login1 Authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35405/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35405/</guid>
      <description>CVE: CVE-2021-35406
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by applogin.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
Authentication is required to exploit this vulnerability.
The router makes POST requests through HTML forms to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35406) Prolink PRC2402M qos.cgi qos_settings Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35406/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35406/</guid>
      <description>CVE: CVE-2021-35406
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by qos.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes POST requests through HTML forms to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35407) Prolink PRC2402M mesh.cgi get_upgrade_page Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35407/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35407/</guid>
      <description>CVE: CVE-2021-35407
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by mesh.cgi, which is passed to popen, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes GET requests to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35409) Prolink PRC2402M nightled.cgi SetNightLed Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35409/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35409/</guid>
      <description>CVE: CVE-2021-35409
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by nightled.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes GET requests to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-2021-30836) WebKit WebCore::AudioNode::disconnect null pointer reference</title>
      <link>https://starlabs.sg/advisories/21/21-30836/</link>
      <pubDate>Wed, 09 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-30836/</guid>
      <description>CVE: CVE-2021-30836
Tested Versions:
 webkitGTK2.32.0  Product URL(s):
 https://webkit.org/  Description of the vulnerability In order to show how we can reproduce it, let&amp;rsquo;s open poc.html in webkitgtk version 2.32.0 within Ubuntu.
Alternatively, you may want to use my docker script to build. Source code of build.sh
docker build . -t webkit_asandocker run -it --name=webkit2.32.0 webkit_asan /bin/bash Source code of Dockerfile
FROM ubuntu:18.04MAINTAINER mipu94RUN echo ${WEBKIT_VERSION}ARG DEBIAN_FRONTEND=noninteractiveRUN apt-get -y update &amp;amp;&amp;amp; \apt-get install -y wget \cmake \bison \git \unzip \xz-utils \apache2 \llvm-7 \ clang-7 \libclang-7-dev \tzdata \sed \ rubyWORKDIR /root/# install ninjaRUN wget https://github.</description>
    </item>
    
    <item>
      <title>(CVE-20221-35402) Prolink PRC2402M live_api.cgi satellist_list Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35402/</link>
      <pubDate>Wed, 09 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35402/</guid>
      <description>CVE: CVE-2021-35402
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by live_api.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes GET requests to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-2021-35408) Prolink PRC2402M qos.cgi qos_sta_settings Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35408/</link>
      <pubDate>Tue, 08 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-35408/</guid>
      <description>CVE: CVE-2021-35408
Tested Versions:
 Prolink PRC2402M 20190909  Product URL(s):
 https://prolink2u.com/  Description of the vulnerability This vulnerability is present as there are no checks on user input taken by qos.cgi, which is passed to system, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.
No authentication is required to exploit this vulnerability.
The router makes POST requests through HTML forms to interact with the cgi scripts.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0956) Android NFC Out-Of-Bounds Write due to increase mNumTechList without bounds checking</title>
      <link>https://starlabs.sg/advisories/21/21-0956/</link>
      <pubDate>Fri, 28 May 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0956/</guid>
      <description>CVE: CVE-2021-0956
Tested Versions:
 RQ1A.210205.004  Product URL(s):
 https://www.android.com/  Description of the vulnerability There is a Out-Of-Bounds Write problem found in libnfc_nci_jni.so, within the NFC endpoints discovering and activation. Specifically, in file packages/apps/Nfc/nci/jni/NfcTag.cpp, function NfcTag::discoverTechnologies (activation), when a new NFC endpoint is actived, its information is append to some arrays. Since there is no bound check when append data, it may result in a Out-of-bounds Write vulnerability.</description>
    </item>
    
    <item>
      <title>(CVE-2021-30745) Apple macOS QuartzCore Type Confusion Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-30745/</link>
      <pubDate>Thu, 20 May 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-30745/</guid>
      <description>CVE: CVE-2021-30745
Tested Versions:
 macOS Catalina 10.15.5 (19F101)  Product URL(s):
 https://apple.com  Description of the vulnerability This vulnerability exists in QuartzCore Framework, which is used by _windowserver process that allows other applications to interact with OS by mach message that allows attacker can bypass sandbox to get system privilege on the victim&amp;rsquo;s computer.
_windowserver is a process run as higher privilege act as a server to receive any messages from other applications and handle some system privilege actions for them.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0204) Juniper Junos OS Local Privilege Escalation vulnerability in dexp</title>
      <link>https://starlabs.sg/advisories/21/21-0204/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0204/</guid>
      <description>CVE: CVE-2021-0204
Tested Versions:
 Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)  Product URL(s): https://juniper.net
Description of the vulnerability On the Juniper OS, there are a few binaries that have the setuid permission bit enabled. These binaries will run as the owner of the executable (typically as “root”) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as root.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0223) Juniper Junos OS Local Privilege Escalation vulnerability in telnetd</title>
      <link>https://starlabs.sg/advisories/21/21-0223/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0223/</guid>
      <description>CVE: CVE-2021-0223
Tested Versions:
 Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability On the Juniper OS, there are a few binaries that have the setuid permission bit enabled. These binaries will run as the owner of the executable (typically as “root”) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as root.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0254) Junos OS overlayd service bss Buffer Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-0254/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0254/</guid>
      <description>CVE: CVE-2021-0254
Tested Versions:
 Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability overlayd is a service that handles Overlay OAM Packet send to Juniper device. This service runs as root by default when the device starts and listens to the UDP connection on port 4789. Port 4789 is exposed to the internet, and everyone can connect to this port and send data.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0255) Juniper Junos OS Local Privilege Escalation vulnerability in ethtraceroute</title>
      <link>https://starlabs.sg/advisories/21/21-0255/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0255/</guid>
      <description>CVE: CVE-2021-0255
Tested Versions:
 Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability On the Juniper OS, there are a few binaries that have the setuid permission bit enabled. These binaries will run as the owner of the executable (typically as “root”) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as root.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0256) Juniper Junos OS Local Privilege Escalation vulnerability in mosquitto</title>
      <link>https://starlabs.sg/advisories/21/21-0256/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0256/</guid>
      <description>CVE: CVE-2021-0256
Tested Versions:
 Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability On the Juniper OS, there are a few binaries that have the setuid permission bit enabled. These binaries will run as the owner of the executable (typically as “root”) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as root.</description>
    </item>
    
    <item>
      <title>You Talking To Me?</title>
      <link>https://starlabs.sg/blog/2021/04-you-talking-to-me/</link>
      <pubDate>Mon, 12 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/04-you-talking-to-me/</guid>
      <description>What is WebDriver and How does it work? WebDriver is a protocol used for web browser automation. It can drive a browser to perform various tests on web pages as if a real user was navigating through them. It allows simulating user actions such as clicking links, entering text and submitting forms, which can help test if your website is working as intended. It is usually used for front-end testing and web crawling in a headless environment.</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2021</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2021/</link>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2021/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2021 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 07th April to 09th April 2021 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.</description>
    </item>
    
    <item>
      <title>(CVE-2021-2321) Oracle VirtualBox E1000 BSS Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-2321/</link>
      <pubDate>Tue, 06 Apr 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-2321/</guid>
      <description>CVE: CVE-2021-2321
Tested Versions:
 Oracle VirtualBox 6.1.18 revision r142142  Product URL(s):
 https://www.virtualbox.org/  Description of the vulnerability When the e1000 driver is sending data to e1000 device, it will send frame by frame, there are context frame and data frame, usually one context frame followed by one or multiple data frames. We can prepare by setting TDH (Transfer Head), TDBAL (first 32 bit physical address of frames), TDBAH (last 32 bit physical address of frame) register, We can make device doing transfer by writing TDT (Transfer Tail) register and then will call e1kXmitPending to do the transfer.</description>
    </item>
    
    <item>
      <title>(CVE-2021-3409) QEMU Heap Overflow in SDHCI Component</title>
      <link>https://starlabs.sg/advisories/21/21-3409/</link>
      <pubDate>Tue, 23 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-3409/</guid>
      <description>CVE: CVE-2021-3409
Tested Versions:
 QEMU version under 5.2.50  Product URL(s):
 https://www.qemu.org/  Description of the vulnerability QEMU version 5.2.50 is susceptible to vulnerabilities which, when successfully exploited, could lead to the disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).
SDHCI is Secure Digital Host Controller Interface. Secure Digital is a proprietary non-volatile memory card format developed by the SD Association (SDA) for portable devices.</description>
    </item>
    
    <item>
      <title>(CVE-2021-34978) NETGEAR R6260 setupwizard.cgi Buffer Overflow Unauthenticated Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/21/21-34978/</link>
      <pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-34978/</guid>
      <description>CVE: CVE-2021-34978
Tested Versions:
 NETGEAR R6260 V1.1.0.78_1.0.1  Product URL(s):
 https://www.netgear.com/  Description of the vulnerability This vulnerability allows for an attacker with LAN access to a NETGEAR R6260 router to execute arbitrary code. This was tested on the latest firmware available for the router, V1.1.0.78_1.0.1 at the point of writing.
When setupwizard.cgi is executed via a HTTP SOAP request, specially crafted SOAP-ENV headers will cause strncpy() to produce unterminated strings in analyse_XML_namespace().</description>
    </item>
    
    <item>
      <title>(CVE-2021-34979) NETGEAR R6260 mini_httpd Buffer Overflow Unauthenticated Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/21/21-34979/</link>
      <pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-34979/</guid>
      <description>CVE: CVE-2021-34979
Tested Versions:
 NETGEAR R6260 V1.1.0.78_1.0.1  Product URL(s):
 https://www.netgear.com/  Description of the vulnerability This vulnerability allows for an attacker with LAN access to a NETGEAR R6260 router to execute arbitrary code. This was tested on the latest firmware available for the router, V1.1.0.78_1.0.1 at the point of writing.
A buffer overflow in mini_httpd.c:1768 allows for unexpectedly long environment variables to be passed to the setupwizard.cgi executable.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0950) Android NFC android.hardware.nfc@1.2-service Writer mode Out-Of-Bounds Write leading to Information Disclosure</title>
      <link>https://starlabs.sg/advisories/21/21-0950/</link>
      <pubDate>Fri, 05 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0950/</guid>
      <description>CVE: CVE-2021-0950
Tested Versions:
 RQ1A.210205.004  Product URL(s):
 https://www.android.com/  Description of the vulnerability An Out-Of-Bounds Write bug was found in nfc_nci_nxp.so. Specifically, in file &amp;quot;hardware/nxp/nfc/halimpl/hal/phNxpNciHal_ext.cc&amp;quot;, function phNxpNciHal_write_ext, due to lack of proper validation of the length of supplied command prior to increasing length of it, leading to 3 bytes overflow problem. This vulnerability can be turned into a read past the end of a global buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of NFC HIDL service.</description>
    </item>
    
    <item>
      <title>(CVE-2021-33760) Windows Media Foundation Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-33760/</link>
      <pubDate>Sat, 27 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-33760/</guid>
      <description>CVE: CVE-2021-33760
Tested Versions:
 mfsrcsnk.dll 10.0.18362.836  Product URL(s):
 https://www.microsoft.com/  Description of the vulnerability An integer overflow leads to OOB read when parsing MP3 header. The crash can be trigger by navigating into the folder containing the POC file. The crash happens inside mfsrcsnk.dll when parsing MP3 header. Stack trace.
(582c.420c): Access violation - code c0000005 (first chance)First chance exceptions are reported before any exception handling.This exception may be expected and handled.</description>
    </item>
    
    <item>
      <title>(CVE-2021-34503) Windows Media Foundation Type Confusion Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-34503/</link>
      <pubDate>Sat, 27 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-34503/</guid>
      <description>CVE: CVE-2021-34503
Tested Versions:
 mfsrcsnk.dll 10.0.18362.836  Product URL(s):
 https://www.microsoft.com/  Description of the vulnerability There is a type confusion when parsing Quick Time video file format&amp;rsquo;s metadata that leads to OOB access on heap memory. The vulnerability can be triggered by navigating into folder contains POC file, inside Internet Explorer and Microsoft Edge.
The crashes happens inside mfmp4srcsnk.dll when parsing CQTSampleDescriptionAtom. Stack trace.
(2154.3bf0): Access violation - code c0000005 (first chance)First chance exceptions are reported before any exception handling.</description>
    </item>
    
    <item>
      <title>(CVE-2021-1758) macOS/iOS CoreText Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-1758/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-1758/</guid>
      <description>CVE: CVE-2021-1758
Tested Versions:
 macOS Catalina 10.15.4 (19E287)  Product URL(s):
 https://apple.com  Description of the vulnerability This vulnerability exists in libFontParser.dylib, a part of CoreText library is widely used in macOS, iOS, iPadOS to parse, and draw text. This vulnerability allows attacker to read memory of application which uses API from CoreText.
macOS/iOS creates a font format structure that is a wrapper of Type 1 Postscript Font and TrueType Font is Mac Resource Fork Font.</description>
    </item>
    
    <item>
      <title>(CVE-2021-1790) macOS/iOS CoreText libhvf Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-1790/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-1790/</guid>
      <description>CVE: CVE-2021-1790
Tested Versions:
 macOS Catalina 10.15.4 (19E287)  Product URL(s):
 https://apple.com  Description of the vulnerability This vulnerability exists in libhvf.dylib, a part of CoreText library is widely used in macOS, iOS, iPadOS to parse font. An attacker can craft an evil PDF contains the malicious font that could lead to remote code execution.
libhvf.dylib is used to parse HierVariation table in Truetype Font. libhvf.dylib is a feature of libFontParser.</description>
    </item>
    
    <item>
      <title>Chrome 1-Day Hunting - Uncovering and Exploiting CVE-2020-15999</title>
      <link>https://starlabs.sg/blog/2021/01-chrome-1-day-hunting-uncovering-and-exploiting-cve-2020-15999/</link>
      <pubDate>Sat, 09 Jan 2021 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2021/01-chrome-1-day-hunting-uncovering-and-exploiting-cve-2020-15999/</guid>
      <description>Introduction This blog post details the exploitation process for the vulnerability CVE 2020-15999 in Google Chrome 86.0.4222.0 on Linux. While CVE 2020-15999 is a heap-based buffer overflow in the font-loading library Freetype rather than Chrome proper, its extensive use in the latter enables us to achieve code execution in the browser’s renderer. This post will not be focused on the analysis of the bug, but rather its exploitation, as extensive explanation and analysis can be found here.</description>
    </item>
    
    <item>
      <title>Instrumenting Adobe Reader with Frida</title>
      <link>https://starlabs.sg/blog/2020/11-instrumenting-adobe-reader-with-frida/</link>
      <pubDate>Fri, 13 Nov 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/11-instrumenting-adobe-reader-with-frida/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://frida.re/&#34;&gt;Frida&lt;/a&gt; is an open-source dynamic instrumentation toolkit that has become popular in recent years, and its use in mobile security is especially prevalent.&lt;/p&gt;
&lt;p&gt;In this post, I would like to provide a general introduction to the tool and show some examples of how it can also be used on the Windows platform.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Pwn2Own Tokyo 2020</title>
      <link>https://starlabs.sg/achievements/p2o-tokyo-2020/</link>
      <pubDate>Sun, 08 Nov 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-tokyo-2020/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2020 fall edition of Pwn2Own (Pwn2Own Tokyo) was held from 06th to 08th November 2020 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.</description>
    </item>
    
    <item>
      <title>Analysis &amp; Exploitation of a Recent TP-Link Archer A7 Vulnerability</title>
      <link>https://starlabs.sg/blog/2020/10-analysis-and-exploitation-of-a-recent-tp-link-archer-a7-vulnerability/</link>
      <pubDate>Fri, 16 Oct 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/10-analysis-and-exploitation-of-a-recent-tp-link-archer-a7-vulnerability/</guid>
      <description>This post provides detailed analysis and an exploit achieving remote code execution for CVE-2020-10882, which was used at Pwn2Own 2019, on the TP-Link Archer C7:
 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. When parsing the slave_mac parameter, the process does not properly validate a user-supplied string before using it to execute a system call.</description>
    </item>
    
    <item>
      <title>Pwn2Own 2020: Oracle VirtualBox Escape</title>
      <link>https://starlabs.sg/blog/2020/09-pwn2own-2020-oracle-virtualbox-escape/</link>
      <pubDate>Fri, 25 Sep 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/09-pwn2own-2020-oracle-virtualbox-escape/</guid>
      <description>&lt;p&gt;In this post, we will cover the vulnerabilities used at Pwn2Own 2020 for the Oracle VirtualBox escape.
These two vulnerabilities affect Oracle VirtualBox 6.1.4 and prior versions.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>This Font is not Your Type</title>
      <link>https://starlabs.sg/blog/2020/09-this-font-is-not-your-type/</link>
      <pubDate>Fri, 04 Sep 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/09-this-font-is-not-your-type/</guid>
      <description>Half a year ago, I found a vulnerability in libFontParser.dylib, which is a part of CoreGraphics library that is widely used in macOS, iOS, iPadOS to parse and render fonts. This vulnerability was patched in iOS 13.5.1 &amp;amp; macOS 10.15.5. In this writeup, I will describe the bug in detail in hopes that it will help others to better understand this vulnerability. This issue could allow an attacker to execute code during the parsing of a malicious font.</description>
    </item>
    
    <item>
      <title>(CVE-2020-24430) Adobe Acrobat Pro DC FDF.addContact Use-After-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-24430/</link>
      <pubDate>Fri, 21 Aug 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-24430/</guid>
      <description>CVE: CVE-2020-24430
Tested Versions:
 Adobe Reader DC 2020.012.20041  Product URL(s):
 https://adobe.com  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).
There is an UAF bug when Adobe Acrobat DC executes javascript related to the FDF.addContact function
The following is the crash context (with page heap enabled):</description>
    </item>
    
    <item>
      <title>ASUSWRT URL Processing Stack Buffer Overflow</title>
      <link>https://starlabs.sg/blog/2020/08-asuswrt-url-processing-stack-buffer-overflow/</link>
      <pubDate>Fri, 07 Aug 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/08-asuswrt-url-processing-stack-buffer-overflow/</guid>
      <description>While processing the URL for any blacklisted XSS list like the script tag in the check_xss_blacklist function, a stack buffer overflow is possible by extending the length of the URL when accessing the web interface of the ASUS Router. To exploit it, stack pivoting technique is used before chaining up ROP gadgets to call our own custom command. In this post, we show how this can be exploited to get a reverse shell.</description>
    </item>
    
    <item>
      <title>(CVE-2020-13937) Apache Kylin - Unauthenticated Configuration Disclosure</title>
      <link>https://starlabs.sg/advisories/20/20-13937/</link>
      <pubDate>Fri, 17 Jul 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-13937/</guid>
      <description>CVE: CVE-2020-13937
Tested Versions:
 All versions starting from 2.0.0 up to 2.3.2, all versions starting from 2.4.0 up to 2.4.1, all versions starting from 2.5.0 up to 2.5.2, all versions starting from 2.6.0 up to 2.6.6, all versions starting from 3.0.0 up to 3.0.2, version 3.1.0  Product URL(s):
 http://kylin.apache.org/  Description of the vulnerability There is an unauthenticated configuration disclosure via /kylin/api/admin/config GET API Endpoint.
The getConfig() method of AdminController.</description>
    </item>
    
    <item>
      <title>Oracle VirtualBox VHWA Use-After-Free Privilege Escalation Vulnerability</title>
      <link>https://starlabs.sg/blog/2020/06-oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability/</link>
      <pubDate>Fri, 26 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/06-oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability/</guid>
      <description>&lt;p&gt;As part of my month-long internship at STAR Labs, I was introduced to VirtualBox and learnt much about bug hunting and triaging, root-cause analysis and exploitation. This post will detail a use-after-free bug I found during the duration of the internship, and specifics on the VM escape exploit that I wrote utilising the bug. The latest version at the point of reporting was VirtualBox 6.1.2 r135662.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>(CVE-2020-0634) Windows CLFS UAF Memory Corruption Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-0634/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-0634/</guid>
      <description>CVE: CVE-2020-0634
Tested Versions:
 Windows RS2( 2019.01.08) build 7763 ntoskrnl.exe file version 10.0.17763.195 . MD5:4a8bc8a4b90486a5567fb6c6bf93ab6b  Product URL(s):
 https://www.microsoft.com/  Description of the vulnerability An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.</description>
    </item>
    
    <item>
      <title>(CVE-2020-1664) Juniper Junos OS dcd create_debug_data() buffer overflow</title>
      <link>https://starlabs.sg/advisories/20/20-1664/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-1664/</guid>
      <description>CVE: CVE-2020-1664
Tested Versions:
 Junos OS 20.1R1.11  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability dcd is device control daemon and is running as root by default when the device starts. This daemon has a stack buffer overflow vulnerability that allows an attacker with low privilege to DOS the daemon or execute arbitrary code in the system with root privilege.
The vulnerability exists in create_debug_data() function:
FILE *create_debug_data() { char v13; // [esp+3h] [ebp-51h]  result = fopen(&amp;#34;/var/tmp/dcd_debug.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0218) Junos OS lc_fetch_license_keys() command injection</title>
      <link>https://starlabs.sg/advisories/21/21-0218/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0218/</guid>
      <description>CVE: CVE-2021-0218
Tested Versions:
 Junos OS 20.1R1.11  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability license-check is a daemon to manage license in Juniper device. By default, this daemon is running as root. There is a command injection vulnerability in license-check daemon that allows an attacker with low privilege to execute a command with root privilege.
The command injection exists in the license update feature. To update license, user run command request system license update in cli console.</description>
    </item>
    
    <item>
      <title>(CVE-2021-0219) Juniper Junos OS validate package mgd_package_real() command injection</title>
      <link>https://starlabs.sg/advisories/21/21-0219/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-0219/</guid>
      <description>CVE: CVE-2021-0219
Tested Versions:
 Junos OS 20.1R1.11  Product URL(s):
 https://www.juniper.net/  Description of the vulnerability The command injection vulnerability exists in the validation of the installed package. Upon successfully exploiting this vulnerability, an attacker with low privilege can execute a command with root privilege in the system.
To validate a package on host before installing, user run command request system software add validate-on-host &amp;lt;host&amp;gt; &amp;lt;package-path&amp;gt; in cli console.</description>
    </item>
    
    <item>
      <title>(CVE-2021-1485) Cisco IOS XR CLI Arbitrary Command Injection</title>
      <link>https://starlabs.sg/advisories/21/21-1485/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/21/21-1485/</guid>
      <description>CVE: CVE-2021-1485
Tested Versions:
 Cisco IOS XRv 64 bit 7.0.2  Product URL(s): https://cisco.com
Description of the vulnerability The router CLI implements some commands as passthrough to the underlying Linux shell. From some tests conducted, it is evident that there are some quoting issues when passing arguments to the shell.
RP/0/RSP0/CPU0# dir &amp;#34;&amp;#39;&amp;#34;sh: -c: line 0: unexpected EOF while looking for matching `&amp;#39;&amp;#39;sh: -c: line 1: syntax error: unexpected end of filesh: -c: line 0: unexpected EOF while looking for matching `&amp;#39;&amp;#39;sh: -c: line 1: syntax error: unexpected end of filedir : &amp;#39; : Path does not exist This type of issue could lead to arbitrary command injection from the restricted CLI that does not have direct access to the shell.</description>
    </item>
    
    <item>
      <title>(CVE-2020-15357) Askey AP5100W Authenticated Command Injection in web Interface</title>
      <link>https://starlabs.sg/advisories/20/20-15357/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-15357/</guid>
      <description>CVE: CVE-2020-15357
Tested Versions:
 Askey AP5100W version Dual_SIG_1.01.071  Product URL(s):
 https://www.askey.com.tw/  Description of the vulnerability Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.
The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.</description>
    </item>
    
    <item>
      <title>(CVE-2020-25545) Askey AP5100W Information Leak through Insecure backups</title>
      <link>https://starlabs.sg/advisories/20/20-25545/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-25545/</guid>
      <description>CVE: CVE-2020-25545
Tested Versions:
 Askey AP5100W version Dual_SIG_1.01.071  Product URL(s):
 https://www.askey.com.tw/  Description of the vulnerability Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.
The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.</description>
    </item>
    
    <item>
      <title>(CVE-2020-25546) Askey AP5100W Logic Error allowing Web Admin authentication bypass</title>
      <link>https://starlabs.sg/advisories/20/20-25546/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-25546/</guid>
      <description>CVE: CVE-2020-25546
Tested Versions:
 Askey AP5100W version Dual_SIG_1.01.071  Product URL(s):
 https://www.askey.com.tw/  Description of the vulnerability Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.
The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2575) Oracle VirtualBox OHCI Uninitialized Heap Variable - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/20/20-2575/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2575/</guid>
      <description>CVE: CVE-2020-2575
Tested Versions:
 Oracle VirtualBox 6.1.0 revision r135406  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2748) Oracle VirtualBox SVGA Out-of-Bounds Read in vmsvgaR3FifoUpdateCursor</title>
      <link>https://starlabs.sg/advisories/20/20-2748/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2748/</guid>
      <description>CVE: CVE-2020-2748
Tested Versions:
 Oracle VirtualBox 6.1.0 r135406  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2758) Oracle VirtualBox VHWA Use-After-Free Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/20/20-2758/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2758/</guid>
      <description>CVE: CVE-2020-2758
Tested Versions:
 Oracle VirtualBox 6.1.2 r135662  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2894) Oracle VirtualBox e1kInsertChecksum Out-of-Bounds Read - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/20/20-2894/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2894/</guid>
      <description>CVE: CVE-2020-2894
Tested Versions:
 Oracle VirtualBox 6.1.0 revision r135406  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2020-10907) Foxit Reader XFA Widget Use-After-Free Code Execution</title>
      <link>https://starlabs.sg/advisories/20/20-10907/</link>
      <pubDate>Thu, 16 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-10907/</guid>
      <description>CVE: CVE-2020-10907
Tested Versions:
 Foxit Reader 9.7.0.29455  Product URL(s):
 https://www.foxitsoftware.com/pdf-reader/  Description of the vulnerability Foxit Reader is a popular PDF reading and printing software.
When processing XFA forms within a PDF, a flaw exists when handling widgets in the form, which can lead to code execution.
The attacker setup a XFA form which has 2 XFA_Widgets: combobox, and checkbox_group.
&amp;lt;!-- XFA Combo Box --&amp;gt; &amp;lt;subform layout=&amp;#34;tb&amp;#34; name=&amp;#34;subform_combox_0&amp;#34;&amp;gt; &amp;lt;occur initial=&amp;#34;1&amp;#34; max=&amp;#34;10&amp;#34; min=&amp;#34;0&amp;#34; name=&amp;#34;occur_subform_combox_0&amp;#34;&amp;gt; &amp;lt;/occur&amp;gt; &amp;lt;field h=&amp;#34;10mm&amp;#34; name=&amp;#34;combox&amp;#34; w=&amp;#34;40mm&amp;#34; x=&amp;#34;10mm&amp;#34; y=&amp;#34;10mm&amp;#34;&amp;gt; &amp;lt;ui&amp;gt; &amp;lt;choiceList open=&amp;#34;onEntry&amp;#34;&amp;gt; &amp;lt;border&amp;gt;&amp;lt;edge/&amp;gt;&amp;lt;/border&amp;gt; &amp;lt;/choiceList&amp;gt; &amp;lt;/ui&amp;gt; &amp;lt;items save=&amp;#34;1&amp;#34;&amp;gt; &amp;lt;text&amp;gt;apples&amp;lt;/text&amp;gt; &amp;lt;text&amp;gt;bananas&amp;lt;/text&amp;gt; &amp;lt;text&amp;gt;pears&amp;lt;/text&amp;gt; &amp;lt;/items&amp;gt; &amp;lt;value&amp;gt; &amp;lt;text&amp;gt;apples&amp;lt;/text&amp;gt; &amp;lt;/value&amp;gt; &amp;lt;event activity=&amp;#34;ready&amp;#34; ref=&amp;#34;$layout&amp;#34;&amp;gt; &amp;lt;script contentType=&amp;#34;application/x-javascript&amp;#34;&amp;gt; xfa.</description>
    </item>
    
    <item>
      <title>TianFu Cup 2019: Adobe Reader Exploitation</title>
      <link>https://starlabs.sg/blog/2020/04-tianfu-cup-2019-adobe-reader-exploitation/</link>
      <pubDate>Fri, 10 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/04-tianfu-cup-2019-adobe-reader-exploitation/</guid>
      <description>&lt;p&gt;Last year, I participated in the &lt;a href=&#34;http://www.tianfucup.com/&#34;&gt;TianFu Cup&lt;/a&gt; competition in Chengdu, China. The chosen target was the Adobe Reader. This post will detail a use-after-free bug of JSObject. My exploit is not clean and not an optimal solution. I have finished this exploit through lots of trial and error.  It involves lots of heap shaping code which I no longer remember exactly why they are there. I would highly suggest that you read the full exploit code and do the debugging yourself if necessary. This blog post was written based on a Windows 10 host with Adobe Reader.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Adventures in Hypervisor: Oracle VirtualBox Research</title>
      <link>https://starlabs.sg/blog/2020/04-adventures-in-hypervisor-oracle-virtualbox-research/</link>
      <pubDate>Fri, 03 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/blog/2020/04-adventures-in-hypervisor-oracle-virtualbox-research/</guid>
      <description>&lt;p&gt;I have been into the vulnerability research field for a while now, and VirtualBox is my very first target. I have learned a lot along the way and I hope that anyone who are interested in escaping hypervisors can find something useful from these notes.
I assume that you have some basic knowledge on memory corruption, hypervisor architecture and device I/O.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2020</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2020/</link>
      <pubDate>Sun, 22 Mar 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2020/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2020 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 19th March to 20th March 2020 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.</description>
    </item>
    
    <item>
      <title>(CVE-2020-3800) Adobe Reader xfa.loadXML Use-after-Free</title>
      <link>https://starlabs.sg/advisories/20/20-3800/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-3800/</guid>
      <description>CVE: CVE-2020-3800
Tested Versions:
 Acrobat DC version 2019.008.20064 (Windows 10 64-bit)  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).
Both Adobe Reader and Acrobat DC share the same AcroForm.api plugin: File Version 19.012.20040.17853
Adobe Reader and Adobe Acrobat DC crashes after executing the following Javascript code:</description>
    </item>
    
    <item>
      <title>(CVE-2020-3801) Adobe Reader XFA Heap Address Leak</title>
      <link>https://starlabs.sg/advisories/20/20-3801/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-3801/</guid>
      <description>CVE: CVE-2020-3801
Tested Versions:
 Acrobat DC version 2019.008.20064 (Windows 10 64-bit)  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).
Both Adobe Reader and Acrobat DC share the same AcroForm.api plugin: File Version 19.012.20040.17853
Adobe Reader (and Adobe Acrobat DC) has a weird &amp;ldquo;feature&amp;rdquo; that leaks heap pointer after executes Javascript when openning XFA PDF.</description>
    </item>
    
    <item>
      <title>(CVE-2020-9816) macOS libFontParser HeapOverflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-9816/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-9816/</guid>
      <description>CVE: CVE-2020-9816
Tested Versions:
 macOS Catalina 10.15.1 (19B88)  Product URL(s):
 https://apple.com  Description of the vulnerability This vulnerability exists in libFontParser.dylib, which is a part of CoreGraphic library is widely used in macOS, iOS, iPadOS to parse Font. Attacker can craft an evil PDF contains malicious font could leads to remote code execution in Apple devices.
The bug exists in TParsingContext::Subroutine method, which parse Subrs field in Type1 Font.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2682) Oracle VirtualBox VBoxVHWAHandleTable Out-Of-Bounds Access Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/20/20-2682/</link>
      <pubDate>Wed, 15 Jan 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2682/</guid>
      <description>CVE: CVE-2020-2682
Tested Versions:
 Oracle VirtualBox 5.2.18 revision r123745  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2020-2674) Oracle VirtualBox OHCI Use-After-Free</title>
      <link>https://starlabs.sg/advisories/20/20-2674/</link>
      <pubDate>Tue, 14 Jan 2020 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2674/</guid>
      <description>CVE: CVE-2020-2674
Tested Versions:
 Oracle VirtualBox 5.2.18 revision r123745  Product URL(s):
 https://virtualbox.org  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2019-16452) Adobe Acrobat/Reader getSound JSObject Use-after-Free - TianFu Cup 2019</title>
      <link>https://starlabs.sg/advisories/19/19-16452/</link>
      <pubDate>Tue, 10 Dec 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-16452/</guid>
      <description>CVE: CVE-2019-16452
Tested Versions:
 Adobe Acrobat and Reader versions 2019.012.20035 and earlier  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files. The commercial proprietary Acrobat, available for Microsoft Windows and macOS only, can also create, edit, convert, digitally sign, encrypt, export and publish PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2020-0889) Microsoft Jet Database Format Record Length Memory Corruption</title>
      <link>https://starlabs.sg/advisories/20/20-0889/</link>
      <pubDate>Wed, 04 Dec 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-0889/</guid>
      <description>CVE: CVE-2020-0889
Tested Versions:
 msexcl40.dll 4.0.9801.17  Product URL(s):
 https://microsoft.com  Description of the vulnerability msexcl40.dll is a part of Microsoft Jet Excel. It is responsible for processing Excel files. When opening a craft .xls file, especially when the pExcelRecordBuffer is corrupt, this will cause an Out-of-Bounds write problem.
The crash occurs at msexcl40!WriteStringPool+0xa5:
0:000&amp;gt; reax=25c90000 ebx=256662ec ecx=00000000 edx=00000000 esi=00000000 edi=256662eceip=7ca9a905 esp=00f6ea8c ebp=00000000 iopl=0 nv up ei pl zr na pe nccs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246msexcl40!</description>
    </item>
    
    <item>
      <title>(CVE-2020-2902) Oracle VirtualBox Direct3D 9 Shader Out-of-Bounds Write Remote Code Execution Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-2902/</link>
      <pubDate>Wed, 04 Dec 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-2902/</guid>
      <description>CVE: CVE-2020-2902
Tested Versions:
 Microsoft Direct3D 9 Runtime version 10.0.17763.1  Product URL(s):
 https://microsoft.com  Description of the vulnerability VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>TianFu Cup 2019</title>
      <link>https://starlabs.sg/achievements/tianfu-cup-2019/</link>
      <pubDate>Sun, 17 Nov 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/tianfu-cup-2019/</guid>
      <description>The &amp;ldquo;Tianfu Cup&amp;rdquo; International Cyber Security Competition is China&amp;rsquo;s version of Hacking competition, for all security practitioners. With the target of gradually creating China&amp;rsquo;s own &amp;ldquo;Pwn2Own&amp;rdquo;, Tianfu Cup International PWN Contest will have three independent and parallel events: the original vulnerability demonstration and recurrence contest, the product Contest, and the system Contest. All teams are required to use original vulnerabilities to hack the given subject.
Today, we are proud to announce that our researcher, Phan Thanh Duy, has successfully Pwned the Adobe PDF Reader.</description>
    </item>
    
    <item>
      <title>(CVE-2020-0961) Microsoft Jet Database file position integer overflow Memory Corruption</title>
      <link>https://starlabs.sg/advisories/20/20-0961/</link>
      <pubDate>Wed, 13 Nov 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/20/20-0961/</guid>
      <description>CVE: CVE-2020-0961
Tested Versions:
 msexcl40.dll 4.0.9801.17  Product URL(s):
 https://microsoft.com  Description of the vulnerability msexcl40.dll is a part of Microsoft Jet Excel, it is responsible for to process excel files when opening a specially crafted .xls file, an memory corruption will occur.
The crash occurs at msexcl40!memcpy+0x2a:
(42b8.1bc0): Access violation - code c0000005 (first/second chance not available)First chance exceptions are reported before any exception handling.This exception may be expected and handled.</description>
    </item>
    
    <item>
      <title>(CVE-2019-1406) Microsoft Jet Engine ColumnLvText Type Confusion</title>
      <link>https://starlabs.sg/advisories/19/19-1406/</link>
      <pubDate>Tue, 12 Nov 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-1406/</guid>
      <description>CVE: CVE-2019-1406
Tested Versions:
 Windows 10 version 1903 and below Windows 7  Product URL(s): https://www.microsoft.com
The Microsoft Jet Database Engine (also Microsoft JET Engine or simply Jet) is a database engine on which several Microsoft products have been built. JET stands for Joint Engine Technology. Microsoft Access and Visual Basic have used Jet as their underlying database engine.
Description of the vulnerability The vulnerable DLL msjet40.dll is a component in versions from Windows 7 to Windows 10.</description>
    </item>
    
    <item>
      <title>(CVE-2019-2984) Oracle VirtualBox Video Hardware Acceleration NULL Pointer Dereferences</title>
      <link>https://starlabs.sg/advisories/19/19-2984/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-2984/</guid>
      <description>CVE: CVE-2019-2984
Tested Versions: Oracle VirtualBox 5.2.18 revision r123745
Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.
There are several interfaces for the guest to communicate with the host in VirtualBox, one of them is Host-Guest Shared Memory Interface (HGSMI) services.</description>
    </item>
    
    <item>
      <title>(CVE-2019-3002) Oracle VirtualBox Integer Divide by Zero in hdaR3StreamInit</title>
      <link>https://starlabs.sg/advisories/19/19-3002/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-3002/</guid>
      <description>CVE: CVE-2019-3002
Tested Versions:
 Oracle VirtualBox 6.0.4 revision r128413  Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.
Vulnerability Intel HD Audio (HDA) is the default VirtualBox Audio Controller for Windows guests.</description>
    </item>
    
    <item>
      <title>(CVE-2019-3005) Oracle VirtualBox NULL Pointer Dereference in hdaR3WalClkSet</title>
      <link>https://starlabs.sg/advisories/19/19-3005/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-3005/</guid>
      <description>CVE: CVE-2019-3005
Tested Versions:
 Oracle VirtualBox 6.0.4 revision r128413  Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.
Vulnerability Intel HD Audio (HDA) is the default VirtualBox Audio Controller for Windows guests.</description>
    </item>
    
    <item>
      <title>(CVE-2019-3026) Oracle VirtualBox VBoxSVGA Invalid Check in vmsvgaFIFOLoop</title>
      <link>https://starlabs.sg/advisories/19/19-3026/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-3026/</guid>
      <description>CVE: CVE-2019-3026
Tested Versions:
 Oracle VirtualBox 6.0.4 revision r128413  Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.
Vulnerability VboxSVGA is the default Video Adapter for Windows guests.</description>
    </item>
    
    <item>
      <title>(CVE-2019-3031) Oracle VirtualBox VMSVGA Out-of-Bounds Read in vmsvga3dSetLightEnabled</title>
      <link>https://starlabs.sg/advisories/19/19-3031/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-3031/</guid>
      <description>CVE: CVE-2019-3031
Tested Versions:
 Oracle VirtualBox 6.0.4 revision r128413  Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.
Vulnerability Besides the default VirtualBox Video Adapter, VirtualBox also emulates VMware virtual SVGA device.</description>
    </item>
    
    <item>
      <title>Driven2Pwn 2019</title>
      <link>https://starlabs.sg/achievements/driven2pwn-2019/</link>
      <pubDate>Thu, 17 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/driven2pwn-2019/</guid>
      <description>HITB Driven2Pwn is the UAE&amp;rsquo;s first bug bounty buffet event - a one stop collaborative bounty organized by Hack In The Box, VXRL and Vulnerability Labs.
Today, we are proud to announce that our researcher, Pham Hong Phi, has successfully Pwned the Oracle VirtualBox in the Virtualization Category.
References  https://twitter.com/driven2pwn/status/1184458553978953728  </description>
    </item>
    
    <item>
      <title>(CVE-2019-8220) Adobe Reader CLstBxField Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8220/</link>
      <pubDate>Tue, 15 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8220/</guid>
      <description>CVE: CVE-2019-8220
Tested Versions:
 Adobe Acrobat and Reader DC versions 2019.012.20040 and earlier  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).
Both Adobe Reader and Acrobat DC share the same DigSig.api plugin:
Image path: C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\plug_ins\DigSig.apiFile Version Number: 19.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8221) Adobe Reader Type Confusion in getColorConvertAction</title>
      <link>https://starlabs.sg/advisories/19/19-8221/</link>
      <pubDate>Tue, 15 Oct 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8221/</guid>
      <description>CVE: CVE-2019-8221
Tested Versions:
 Acrobat DC version 2019.008.20064 (Windows 10 64-bit)  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).
Both Adobe Reader and Acrobat DC share the same Escript.api plugin:
Image path: C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\plug_ins\EScript.apiImage name: EScript.</description>
    </item>
    
    <item>
      <title>(CVE-2019-1250) Microsoft Jet database Record::IsNull Memory Corruption</title>
      <link>https://starlabs.sg/advisories/19/19-1250/</link>
      <pubDate>Tue, 10 Sep 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-1250/</guid>
      <description>CVE: CVE-2019-1250
Tested Versions:
 Windows 10 version 1903 and below Windows 7  Product URL(s): https://www.microsoft.com
The Microsoft Jet Database Engine (also Microsoft JET Engine or simply Jet) is a database engine on which several Microsoft products have been built. JET stands for Joint Engine Technology. Microsoft Access and Visual Basic have used Jet as their underlying database engine.
Vulnerability The vulnerable DLL msrd3x40.dll is a component in versions from Windows 7 to Windows 10.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8011) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/19/19-8011/</link>
      <pubDate>Tue, 13 Aug 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8011/</guid>
      <description>CVE: CVE-2019-8011
Tested Versions:
 Adobe Reader DC 2019.010.20099  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8018) Acrobat Reader DC 2d.x3d!_LoadRGB() OOB Read in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-8018/</link>
      <pubDate>Tue, 13 Aug 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8018/</guid>
      <description>CVE: CVE-2019-8018
Tested Versions:
 Adobe Reader DC 2019.010.20099  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8038) Adobe Acrobat/Reader CTextWidget Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8038/</link>
      <pubDate>Thu, 20 Jun 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8038/</guid>
      <description>CVE: CVE-2019-8038
Tested Versions:
 Adobe Acrobat and Reader versions 2019.012.20035 and earlier  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8039) Adobe Acrobat/Reader CTextField Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8039/</link>
      <pubDate>Thu, 20 Jun 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8039/</guid>
      <description>CVE: CVE-2019-8039
Tested Versions:
 Adobe Acrobat and Reader versions 2019.012.20035 and earlier  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7142) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Read/Write in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-7142/</link>
      <pubDate>Tue, 14 May 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7142/</guid>
      <description>CVE: CVE-2019-7142
Tested Versions:
 Adobe Reader DC 2019.010.20099  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-8010) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/19/19-8010/</link>
      <pubDate>Tue, 07 May 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-8010/</guid>
      <description>CVE: CVE-2019-8010
Tested Versions:
 Adobe Reader DC 2019.010.20099  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7118) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Write in TRGB::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7118/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7118/</guid>
      <description>CVE: CVE-2019-7118
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7119) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Write in TRGB::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7119/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7119/</guid>
      <description>CVE: CVE-2019-7119
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7120) Acrobat Reader DC 2d.x3d!_LoadILBM() Out-of-Bounds Read in TIF::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7120/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7120/</guid>
      <description>CVE: CVE-2019-7120
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7121) Acrobat Reader DC 2d.x3d!_LoadILBM() Out-of-Bounds Read in TIF::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7121/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7121/</guid>
      <description>CVE: CVE-2019-7121
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7122) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read in TTIFFread::TifReadChunkyRGB()</title>
      <link>https://starlabs.sg/advisories/19/19-7122/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7122/</guid>
      <description>CVE: CVE-2019-7122
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7123) Acrobat Reader DC 2d.x3d!_LoadRGB() Memory Corruption in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-7123/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7123/</guid>
      <description>CVE: CVE-2019-7123
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>Pwn2Own Vancouver 2019</title>
      <link>https://starlabs.sg/achievements/p2o-vancouver-2019/</link>
      <pubDate>Fri, 22 Mar 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/achievements/p2o-vancouver-2019/</guid>
      <description>Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.
The 2019 spring edition of Pwn2Own (Pwn2Own Vancouver) was held from 20th March to 22nd March 2019.</description>
    </item>
    
    <item>
      <title>(CVE-2019-2722) Oracle VirtualBox e1000 Integer Underflow - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/19/19-2722/</link>
      <pubDate>Wed, 20 Mar 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-2722/</guid>
      <description>CVE: CVE-2019-2722
Tested Versions:
 Oracle VirtualBox 5.2.28 and earlier Oracle VirtualBox 6.0.6 and earlier  Product URL(s): https://virtualbox.org
VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.</description>
    </item>
    
    <item>
      <title>(CVE-2019-9133) KMPlayer Subtitles Parser Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-9133/</link>
      <pubDate>Thu, 07 Mar 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-9133/</guid>
      <description>CVE: CVE-2019-9133
Tested Versions:
 KMPlayer 4.2.2.12 KMP Plus  Product URL(s):
 http://www.kmplayer.com/  Description of the vulnerability K-Multimedia Player (KMPlayer) is a media player for Windows which can play a large number of formats including VCD, DVD, AVI, MKV, Ogg, OGM, 3GP, MPEG-1/2/4, AAC, WMA 7, 8, WMV, RealMedia, FLV and QuickTime. When processing .sup files, KMPlayer doesn&amp;rsquo;t check the Object size correctly, which leads to integer overflow then to memory out-of-bound read.</description>
    </item>
    
    <item>
      <title>(CVE-2018-20334) ASUSWRT Command Injection in start_apply.htm</title>
      <link>https://starlabs.sg/advisories/18/18-20334/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/18/18-20334/</guid>
      <description>CVE: CVE-2018-20334
Tested Versions: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)
Product URL(s): https://www.asus.com/us/ASUSWRT/
ASUSWRT is the firmware that is shipped with modern ASUS routers. ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.
Vulnerability When processing the POST data, there is a command injection issue. By using this issue, an attacker can control the router.</description>
    </item>
    
    <item>
      <title>(CVE-2018-20335) ASUSWRT Denial of Service of HTTP Service</title>
      <link>https://starlabs.sg/advisories/18/18-20335/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/18/18-20335/</guid>
      <description>CVE: CVE-2018-20335
Tested Versions: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)
Product URL(s): https://www.asus.com/us/ASUSWRT/
ASUSWRT is the firmware that is shipped with modern ASUS routers. ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.
Vulnerability An unauthenticated user can trigger a DoS (Denial of Service) of the httpd service in ASUSWRT.</description>
    </item>
    
    <item>
      <title>(CVE-2018-20336) ASUSWRT Stack Overflow in wanduck.c</title>
      <link>https://starlabs.sg/advisories/18/18-20336/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/18/18-20336/</guid>
      <description>CVE: CVE-2018-20336
Tested Versions: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)
Product URL(s): https://www.asus.com/us/ASUSWRT/
ASUSWRT is the firmware that is shipped with modern ASUS routers. ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.
Vulnerability There is a stack overflow issue in parse_req_queries function in wanduck.c, which may lead to information leak.</description>
    </item>
    
    <item>
      <title>(CVE-2019-16340) Linksys Velop Authentication Bypass</title>
      <link>https://starlabs.sg/advisories/19/19-16340/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-16340/</guid>
      <description>CVE: CVE-2019-16340
Tested Versions:
 Linksys Velop 1.1.2.185309  Product URL(s): https://www.linksys.com/us/velop/
Velop is a WHOLE HOMEMESH Wi-Fi system from LINKSYS. It allows users to enjoy fast, nonstop Wi-Fi everywhere with Velop’s modular easy-to-use Wi-Fi Mesh system.
There are three categories from their official site: WHW0303, WHW0302, WHW0301.
The differences between these three are the pack count: 1, 2 or 3. The system is the same.
Vulnerability There are many information leak problems; one of them is through /sysinfo_json.</description>
    </item>
    
    <item>
      <title>(CVE-2019-7035) Acrobat Reader DC 2d.x3d!_LoadGIF() Arbitrary Write in TGIF::PutPixel()</title>
      <link>https://starlabs.sg/advisories/19/19-7035/</link>
      <pubDate>Tue, 12 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-7035/</guid>
      <description>CVE: CVE-2019-7035
Tested Versions:
 Adobe Reader DC 2019.010.20064  Product URL(s):
 https://acrobat.adobe.com/us/en/acrobat.html https://get.adobe.com/reader/  Description of the vulnerability Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via 3difr.x3d, 2d.x3d and rt3d.dll, which allow viewing embedded 3D contents in PDF files.</description>
    </item>
    
    <item>
      <title>(CVE-2019-16337) Hancom Office Use-after-Free in HncBD90</title>
      <link>https://starlabs.sg/advisories/19/19-16337/</link>
      <pubDate>Thu, 10 Jan 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-16337/</guid>
      <description>CVE: CVE-2019-16337
Tested Versions:
 Hancom Office NEO (HncBD90 version 9.6.1.9403)  Product URL(s): https://www.hancom.com/cs_center/csDownload.do
Description of the vulnerability Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea. When opening a specially crafted Office Open XML Workbook (.xlsx), HncBD90 uses realloc function to reallocate a memory buffer, but after the realloc it continues using the old pointer that has been freed, resulting in a use-after-free vulnerability.</description>
    </item>
    
    <item>
      <title>(CVE-2019-16338) Hancom Office tfo_common Object Use-after-Free in HwordApp</title>
      <link>https://starlabs.sg/advisories/19/19-16338/</link>
      <pubDate>Thu, 10 Jan 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-16338/</guid>
      <description>CVE: CVE-2019-16338
Tested Versions:
 Hancom Office NEO (HwordApp)  Product URL(s): https://www.hancom.com/cs_center/csDownload.do
Description of the vulnerability Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea. When opening a specially crafted Office Open XML Document (.docx), HwordApp does not properly process a tfo_common object which will cause a use-after-free. This may lead to code execution under the context of the application.</description>
    </item>
    
    <item>
      <title>(CVE-2019-16339) Hancom Hcell Unspecified Memory Corruption</title>
      <link>https://starlabs.sg/advisories/19/19-16339/</link>
      <pubDate>Wed, 09 Jan 2019 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-16339/</guid>
      <description>CVE: CVE-2019-16339
Tested Versions:
 HCell.exe 9.6.1.7363 SDSerialize 9.6.1.9403  Product URL(s): https://www.hancom.com/cs_center/csDownload.do
Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea. This vulnerability was discovered within the SDSerialize.dll when opening a specially crafted Office Open XML Workbook (.xlsx). This is part of the Hangul Office Suite.
Vulnerability 0:000&amp;gt; lmvm SDSerializestart end module name6eca0000 6ed36000 SDSerialize (export symbols) C:\Program Files (x86)\Hnc\Office NEO\HOffice96\Bin\SDSerialize.</description>
    </item>
    
    <item>
      <title>(CVE-2018-20333) ASUSWRT Information Disclosure on update_applist.asp</title>
      <link>https://starlabs.sg/advisories/18/18-20333/</link>
      <pubDate>Fri, 21 Dec 2018 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/18/18-20333/</guid>
      <description>CVE: CVE-2018-20333
Tested Versions: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)
Product URL(s): https://www.asus.com/us/ASUSWRT/
ASUSWRT is the firmware that is shipped with modern ASUS routers. ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.
Vulnerability An unauthenticated user can request the http://&amp;lt;ROUTERIP&amp;gt;/update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router.</description>
    </item>
    
    <item>
      <title>(CVE-2019-6984) Foxit Reader U3D Shading Modifier Block Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-6984/</link>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-6984/</guid>
      <description>CVE: CVE-2019-6984
Tested Versions:
 Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425  Product URL(s):
 https://www.foxitsoftware.com/pdf-reader/  Description of the vulnerability Foxit Reader is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.</description>
    </item>
    
    <item>
      <title>(CVE-2019-6985) Foxit Reader U3D 2D Glyph Modifier Block Use-after-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-6985/</link>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-6985/</guid>
      <description>CVE: CVE-2019-6985
Tested Versions:
 Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425  Product URL(s):
 https://www.foxitsoftware.com/pdf-reader/  Description of the vulnerability Foxit Reader is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.</description>
    </item>
    
    <item>
      <title>(CVE-2019-6982) Foxit Reader U3D CLOD Mesh Declaration OOB Write</title>
      <link>https://starlabs.sg/advisories/19/19-6982/</link>
      <pubDate>Tue, 27 Nov 2018 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-6982/</guid>
      <description>CVE: CVE-2019-6982
Tested Versions: Foxit Reader 9.0.1.1049, U3DBrowser.fpi 9.0.1.994
Product URL(s): https://www.foxitsoftware.com/pdf-reader/
Foxit Reader is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.</description>
    </item>
    
    <item>
      <title>(CVE-2019-6983) Foxit Reader U3D File Header Block Heap Overflow</title>
      <link>https://starlabs.sg/advisories/19/19-6983/</link>
      <pubDate>Tue, 27 Nov 2018 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/advisories/19/19-6983/</guid>
      <description>CVE: CVE-2019-6983
Tested Versions: Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425
Product URL(s): https://www.foxitsoftware.com/pdf-reader/
Foxit Reader is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.</description>
    </item>
    
    
    <item>
      <title>Our Team</title>
      <link>https://starlabs.sg/team/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://starlabs.sg/team/</guid>
      <description>team</description>
    </item>
    
    
  </channel>
</rss>
