Johan Carlsson

Hobby security researcher, mainly at hackerone.com/joaxcar 
Twitter at twitter.com/joaxcar

2023-06-11

Back here after having a long relapse to the bird site. Old habits die hard

Exited to see if the content quality is still way better here ๐Ÿ˜Š

2023-06-11

@AlesandroOrtiz @thomasorlita That Regex was tricky! Did not get why a / would be allowed before the real redirect URL at first. Nice one!

2023-01-05

Interesting write-up about a blockchain bug. Scoring 1M$ in bounty. Key takeaway after reading: It's all about domain knowledge! The same goes for all programs, there are tons of "simple" bugs that you can only find if you know the domain.

The bug found here was โ€simpleโ€ (but as always hard to find anyhow). Finding it probably took some coding skill, some luck, but also tons of domain knowledge!

pwning.mirror.xyz/RFNTSouIIlHV

Johan Carlsson boosted:
Frederik Braun ๏ฟฝfreddy@security.plumbing
2022-12-31

Hey! Iโ€™m going to give a #websec talk at #HIP22 in FIVE minutes:

"What if XSS was a browser bug?"

You can watch the stream at streaming.media.ccc.de/jev22/h and Iโ€™m happy to answer questions here or on the Matrix channel linked from hip-berlin.de

2022-12-22

@michenriksen And 2FA. I get angry every time I need to get my phone and remember which Athenticator app I used, and find the 2FA code. Know it is a good thing. But boy it is a bad experience

2022-12-20

@freddy Yes that looks like it could be it! Thanks

Was a bit confused that target="name" worked, but I guess only target="_blank" will have the hidden "noopener" as default

2022-12-20

@freddy I remember you asking Mike West why Chrome blocked javascript URLs from triggering when launched from a target="_blank" a tag.

It now looks like Firefox behaves in the same way, but I fail to find a mention of it in bugzilla. Do you know where and why the change was made?

Looks like JS is blocked when the opened window lacks an "window.opener". So

```
<a href="javascript:alert()" target="_blank">no trigger</a>
<a href="javascript:alert()" target="test">will trigger</a>
<a href="javascript:alert()" target="test" rel="noopener">no trigger</a>
```

2022-12-20

GitLab have released a blog detailing their bug bounty program year summary.

I did manage to snag a mention ("Most valid reports to our program") which was one of my goals this year. I aimed for the more prestigious titles, but the competition is tough and @yvvdwf  's RCE was definitely one of the highlights of the year. The same goes for @vakzz flag capture and taraszelyk info leaks. Learned a lot from all of them!

about.gitlab.com/blog/2022/12/

2022-12-14

@insiderphd great sugestion ๐Ÿ˜Š I found afordable ones at 6 letters(including dot) with on pair being able to exchange for one unicode. Was happy about it, but it has yet to repay itself ๐Ÿ˜„

2022-12-06

@fransrosen @ryotak might be your report? hard to tell who is who on mastodon :) great report anyhow!

2022-12-06

I think the "dirty dance" none happy path OAuth "feature" discussed in @fransrosen s blog post will prove to prove useful again and again. Hard to package nicely for triagers. But high impact.

I have had the pleasure to use it once so far.

And this report to GitLab shows another great usage of it to escalate a chain of open redirects to an account takeover

gitlab.com/gitlab-org/gitlab/-

Johan Carlsson boosted:
Anna-Lena Kรถnigblog_bleistift
2022-11-25

๐Ÿ”ด ๐˜–๐˜ถ๐˜ต๐˜ฑ๐˜ถ๐˜ต ๐˜ฐ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ต๐˜ฆ๐˜ฅ product development is when you have features in mind and you focus on the solution. ๐ŸŸข ๐˜–๐˜ถ๐˜ต๐˜ค๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ฐ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ต๐˜ฆ๐˜ฅ product development is when you focus on the problem and iterate to a solution.

An outcome is a measurable change in behaviour that drives business results.

That's what we want!

๐™๐™ค๐™ฌ ๐™™๐™ค ๐™ฎ๐™ค๐™ช ๐™ข๐™–๐™ ๐™š ๐™ฉ๐™๐™š ๐™จ๐™๐™ž๐™›๐™ฉ?
๐™’๐™๐™–๐™ฉ ๐™๐™–๐™จ๐™ฃ'๐™ฉ ๐™–๐™ฃ๐™™ ๐™ฌ๐™๐™–๐™ฉ ๐™๐™–๐™จ ๐™ฌ๐™ค๐™ง๐™ ๐™š๐™™ ๐™›๐™ค๐™ง ๐™ฎ๐™ค๐™ช?

In my next job, I would like to introduce the continuous discovery habits from @ttorres

2022-11-21

@AlesandroOrtiz Will definitely do that! Getting deeper into Chromium is my next goal. I have tried some other programs, but programs without public bug reports are not as fun. I learn so much from reading all these report

2022-11-19

@AlesandroOrtiz You will get an honorable mention as your CVE-2022-1637 report sparked my interest in looking at browsers! ๐Ÿ˜ŠUnfortunately, I haven't had that much time to continue down that path since reporting this. Getting back into it is high on my todo-list for next year though!

2022-11-19

A couple of days ago I managed to escalate my fist ever Chrome bug to account takeover cross (subdomain) origin. Really happy with the finding, which I would never had been able to find without the knowledge shared by security researchers over at Twitter. Really hope that the community stays as accessible for newcomers as it was before. Even after people scatter around different alternatives

Hope to be able to write my first ever write-up about the bug in the coming weeks, and give credit to the people that inspire me to dive deeper into this field

2022-11-16

@ajxchapman @joern I know that Z-Wink talked about this. He seems to really enjoy looking for IDORs though, so it is not exactly the same situation. But one thing that gives you is high paying bugs that need close to zero report writing. "Here is the endpoint -> PII leak"

Avoiding complex report writing could fit into your number 6

2022-11-12

@michenriksen are you at the level where it is all muscle memories yet? I find myself talking to myself: "delete inner big word" like I am hunt and pecking mentally. Still love i though, but don't know if it make me productive :)

2022-11-12

@michenriksen fond memories! will answer some emails with this as a soundtrack right now! Thanks for the throwback 

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst