anthony weems

cloud vuln research @ google

2024-10-04

Learn how Google CVR could have potentially exfiltrated Gemini 1.0 Pro before launch last year. We describe the vulnz, the fix, tips for bughunters, and how we found similar issues in another cloud provider with similar impact.

bughunters.google.com/blog/567

anthony weems boosted:
2023-01-05

We've just launched a new topic on bypassing SameSite cookie restrictions! Learn how to evade browsers' cookie defences and perform successful cross-site attacks with our interactive labs:
portswigger.net/web-security/c

anthony weems boosted:
Zack Whittakerzackwhittaker
2022-12-01

New: Google says Variston IT, a Barcelona-based spyware vendor, is behind an exploitation framework that exploited zero-day flaws in Chrome, Firefox and Windows Defender as far back as 2018.

My colleague @carlypage has more: techcrunch.com/2022/11/30/vari

a photo of a Windows computer.
anthony weems boosted:
Sebastian Schinzelseecurity@infosec.exchange
2022-11-18

As a side node, we discovered a Vaudenay-style padding oracle against Google Hosted S/MIME. Concretely, Google’s SMTP server issued different error codes depending on whether it successfully decrypted an S/MIME mail or not. On average, this attack requires 128 query mails per byte to recover the plaintext an S/MIME mail. See Appendix A in the paper for the details.

2022-11-18

@gaz My main impression: the DOM Invader prototype pollution feature is almost too good. I click a button, I get an exploit. 😛

2022-11-10

Two fun #Kubernetes CVEs were published today!

CVE-2022-3294 [1] is a bypass for the node proxy restrictions (related to the TOCTOU found in CVE-2020-8562 [2].

CVE-2022-3162 [3] is a very cool authorization bug that was caused by URI path traversal in the etcd client.

[1] github.com/kubernetes/kubernet
[2] github.com/kubernetes/kubernet
[3] github.com/kubernetes/kubernet

anthony weems boosted:
2022-11-10

We've just launched a Web Security Academy topic on Client-side prototype pollution, with challenge labs designed by @gaz - enjoy!

portswigger.net/web-security/p

anthony weems boosted:
2022-11-10

Accidental $70k Google Pixel
Lock Screen Bypass - love a good accidental vulnerability! bugs.xdavidhu.me/google/2022/1

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst