<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2987759532072489303</atom:id><lastBuildDate>Sat, 21 Mar 2026 07:39:49 +0000</lastBuildDate><category>WebHacking</category><category>RCE</category><category>CVE</category><category>BugBounty</category><category>PHP</category><category>Java</category><category>XSS</category><category>Authentication Bypass</category><category>Deserialization</category><category>Exchange</category><category>HITCON</category><category>ProxyLogon</category><category>ProxyOracle</category><category>ProxyShell</category><category>Pwn2Own</category><category>CGI</category><category>Padding Oracle</category><category>Apache</category><category>Binary Exploitation</category><category>CTF</category><category>Github</category><category>Jenkins</category><category>SQL Injection</category><category>SSL VPN</category><category>SSRF</category><category>CSP</category><category>Cache Poisoning</category><category>Google</category><category>Hash Table</category><category>IIS</category><category>JRMP</category><category>MDM</category><category>Microsoft</category><category>NTLM</category><category>ProxyNotShell</category><category>ProxyRelay</category><category>RPC</category><category>Relay</category><title>Orange</title><description>This is Orange Speaking :)</description><link>http://orange-tw.blogspot.com/</link><managingEditor>noreply@blogger.com (Orange Tsai)</managingEditor><generator>Blogger</generator><openSearch:totalResults>93</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>This is Orange Speaking :)</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-63371703473550635</guid><pubDate>Fri, 09 Aug 2024 03:00:00 +0000</pubDate><atom:updated>2024-08-12T18:52:09.755+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apache</category><category domain="http://www.blogger.com/atom/ns#">Authentication Bypass</category><category domain="http://www.blogger.com/atom/ns#">CGI</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>[EN] Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!</title><atom:summary type="text">

Orange Tsai (@orange_8361) &amp;nbsp;|&amp;nbsp; 繁體中文版本 &amp;nbsp;|&amp;nbsp; English VersionHey there! This is my research on Apache HTTP Server presented at Black Hat USA 2024. Additionally, this research will also be presented at HITCON and OrangeCon. If you’re interested in getting a preview, you can check the slides here:
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!
Also,</atom:summary><link>http://orange-tw.blogspot.com/2024/08/confusion-attacks-en.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPC506ziev4fJXtMlHNpXqYA17yX5uywSmqdESOSWh6wl2NYtmZFm1U4ygJLE3P3xExW5WsXLTDghdztSQshpvprnISOwZWF2NR_aQSWU8_RjLX65_NLjk3l3FrPWpqPJIFRTVV9vVIcStMPAS-0-l7dF6pjJR4pgCbRhP2qvhyznH6f86ZJ-Ofgs7Tq0/s72-c/fb48778b63a5eead717f13f46.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-7490293080162529882</guid><pubDate>Fri, 09 Aug 2024 03:00:00 +0000</pubDate><atom:updated>2024-08-12T18:51:36.878+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apache</category><category domain="http://www.blogger.com/atom/ns#">Authentication Bypass</category><category domain="http://www.blogger.com/atom/ns#">CGI</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>[中文] Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!</title><atom:summary type="text">

Orange Tsai (@orange_8361) &amp;nbsp;|&amp;nbsp; 繁體中文版本 &amp;nbsp;|&amp;nbsp; English Version嗨，這是我今年發表在 Black Hat USA 2024 上針對 Apache HTTP Server 的研究。 此外，這份研究也將在 HITCON 和 OrangeCon 上發表，有興趣搶先了解可點此取得投影片：
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!
另外也謝謝來自 Akamai 的友善聯繫！ 此份研究發表後第一時間他們也發佈了緩解措施 (詳情可參考 Akamai 的部落格)。TL;DR這篇文章探索了 Apache HTTP Server 中存在的架構問題，介紹了數個 Httpd 的架構債，包含 3 種不同的 </atom:summary><link>http://orange-tw.blogspot.com/2024/08/confusion-attacks-ch.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPC506ziev4fJXtMlHNpXqYA17yX5uywSmqdESOSWh6wl2NYtmZFm1U4ygJLE3P3xExW5WsXLTDghdztSQshpvprnISOwZWF2NR_aQSWU8_RjLX65_NLjk3l3FrPWpqPJIFRTVV9vVIcStMPAS-0-l7dF6pjJR4pgCbRhP2qvhyznH6f86ZJ-Ofgs7Tq0/s72-c/fb48778b63a5eead717f13f46.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-280209916334138832</guid><pubDate>Thu, 06 Jun 2024 22:00:00 +0000</pubDate><atom:updated>2024-06-07T14:47:32.303+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CGI</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><title>CVE-2024-4577 - Yet Another PHP RCE: Make PHP-CGI Argument Injection Great Again!</title><atom:summary type="text">
  
  This is a side story/extra bug while I’m preparing for my Black Hat USA presentation. I believe most of the details have already been covered in the official advisory&amp;nbsp;(should be published soon). Although PHP-CGI has gradually been phased out over time, this vulnerability affects XAMPP for Windows by default, allowing unauthenticated attackers to execute arbitrary code on remote XAMPP </atom:summary><link>http://orange-tw.blogspot.com/2024/06/cve-2024-4577-yet-another-php-rce.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA3i_ADbdjw_-LGREpST0M_2jOfsG_DI-oYOK_c8qYmpHoZgLwo-TkTh7QEzWlIPhy7D-RyV1ueRmiVt3-_rcA_M8xa5U-pVITPypfQSJ8iEkaV8t7V-WLXiqK2BCD-Q7ue7eWu2cA4rzEyo3cYvwjHcYzsddSQNhHbQMViuY3d5e5uUsqP3ZHn9t6PW4/s72-w640-h512-c/_hd_resize.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-7381055862186784874</guid><pubDate>Sat, 12 Aug 2023 08:00:00 +0000</pubDate><atom:updated>2023-08-17T01:16:12.064+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>從 2013 到 2023: Web Security 十年之進化與趨勢!</title><atom:summary type="text">TL;DR for Hackers &amp;amp; Researchers: this is a more conceptual talk for web developers. All are in Mandarin but you can check the slides&amp;nbsp;here if interested.好久沒有打部落格了，紀錄一下這次我在 WebConf 2023 上的演講，大概就是把 Web Security 這十年的演化趨勢分類、並給出相對應的攻擊手法當案例，雖然沒配演講看投影片應該不知道在供三小，不過有興趣還是可以點這邊獲得投影片!由於聽眾皆為網站開發者 (涵蓋前端、後端甚至架構師)，因此選用的攻擊手法力求簡單、可快速理解又有趣，不談到防禦手法也在因為短短 45 分鐘內絕對涵蓋不完，所以給自己訂下的小目標是: 只要有一項也好，如果開發者遇到同樣場景、腦中會跳出個</atom:summary><link>http://orange-tw.blogspot.com/2023/08/2023-webconf-the-evolution-of-web-security.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/a/AVvXsEics6XGN2a6fA0P6gktIpFf7fRAhtM6lzfj99aDB8zzfHXHIKxn6xsiMHFlsZBsTwduo4HHPnF2sMoZaHaQzXyg0wtvuUnphocyC2xhvu882NvEAuxvW5jzoROa6yTypvJ9o2xtxRXq3ZnmUPonVrWgDCMVJpYEgs2F-3zAsVWzvHj4FzEdr0Vzq3BAu3I=s72-c" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-9170173093020925587</guid><pubDate>Wed, 19 Oct 2022 07:58:00 +0000</pubDate><atom:updated>2022-10-19T15:58:50.274+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Authentication Bypass</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Exchange</category><category domain="http://www.blogger.com/atom/ns#">NTLM</category><category domain="http://www.blogger.com/atom/ns#">ProxyLogon</category><category domain="http://www.blogger.com/atom/ns#">ProxyNotShell</category><category domain="http://www.blogger.com/atom/ns#">ProxyOracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyRelay</category><category domain="http://www.blogger.com/atom/ns#">ProxyShell</category><category domain="http://www.blogger.com/atom/ns#">Pwn2Own</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">Relay</category><category domain="http://www.blogger.com/atom/ns#">RPC</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>A New Attack Surface on MS Exchange Part 4 - ProxyRelay!</title><atom:summary type="text">



  
  This is a cross-post blog from DEVCORE. You can check the series on:
   
      A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
      A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
      A New Attack Surface on MS Exchange Part 3 - ProxyShell!
      A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
   
   
   Hi, this is a long-time-pending article. We could </atom:summary><link>http://orange-tw.blogspot.com/2022/10/proxyrelay-a-new-attack-surface-on-ms-exchange-part-4.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLgL66cddbQuDLFONx2D5FxUJ33hJjkCL86BK1WCi9YkJ3HsCoMfv-8P0IHQ0XEJf7aQe_KlYLkigMamA_2mK8gK4tiUflSSCnm_QKAVDUZPqZyo1RQ4nYOpAhLIh2itIQIJ3kl53bHbokKbmxyQM8MmtoWRIbpOp9ViaoaqKPttsJHxJ8vhLw-6m-/s72-c/PZSu3DO.jpeg" width="72"/><thr:total>0</thr:total><georss:featurename>台灣</georss:featurename><georss:point>23.69781 120.960515</georss:point><georss:box>-27.969674791403595 50.648015 75.3652947914036 -168.726985</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-3868021539939094436</guid><pubDate>Wed, 17 Aug 2022 16:00:00 +0000</pubDate><atom:updated>2022-08-18T01:31:06.420+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Authentication Bypass</category><category domain="http://www.blogger.com/atom/ns#">Binary Exploitation</category><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">Cache Poisoning</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Hash Table</category><category domain="http://www.blogger.com/atom/ns#">IIS</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS!</title><atom:summary type="text">
  Hi, this is my fifth time speaking at Black Hat USA and DEFCON. You can get the slide copy and video there: 
  
    
      Let’s Dance in the Cache - Destabilizing Hash Table on Microsoft IIS (slides)
    
    
      Let’s Dance in the Cache - Destabilizing Hash Table on Microsoft IIS (video - TBD)
    
  
  As the most fundamental Data Structure in Computer Science, Hash Table is extensively </atom:summary><link>http://orange-tw.blogspot.com/2022/08/lets-dance-in-the-cache-destabilizing-hash-table-on-microsoft-iis.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAT42hORpPC8TxDls62vdNY3YtjuBQWmswyUk8IHwDMpjJEvYy_ZoIQcVwlPQKQOJcDwZqWWyh8lCCfStdU9hTqqoznde71KP4IPfvjAi-UvwQR8k3yRd5JmtnTuDHl2Ek2NKY_4lKS_PE0BTE2_nEPc7ki_OYneOXEFJ97miuzlI1t1_pSyzPwUTO/s72-c/Orange_Tsai_Lets_Dance_in_the_Cache_Destabilizing_Hash_Table_on_2090f238-a1ba-4f55-947e-5668a8c1a2f7.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-8052790033965476461</guid><pubDate>Wed, 18 Aug 2021 15:08:00 +0000</pubDate><atom:updated>2022-10-19T16:45:35.613+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exchange</category><category domain="http://www.blogger.com/atom/ns#">Padding Oracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyLogon</category><category domain="http://www.blogger.com/atom/ns#">ProxyOracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyShell</category><category domain="http://www.blogger.com/atom/ns#">Pwn2Own</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>A New Attack Surface on MS Exchange Part 3 - ProxyShell!</title><atom:summary type="text">
 
  
    
        Author: Orange Tsai(@orange_8361) from DEVCORE
        P.S. This is a cross-post blog from Zero Day Initiative (ZDI)
    
  
  
  
  
  This is a guest post DEVCORE collaborated with Zero Day Initiative (ZDI) and published at their blog, which describes the exploit chain we demonstrated at Pwn2Own 2021!&amp;nbsp;&amp;nbsp;Please visit the following link to read that :)FROM PWN2OWN 2021</atom:summary><link>http://orange-tw.blogspot.com/2021/08/proxyshell-a-new-attack-surface-on-ms-exchange-part-3.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVA9a1rtQVOqBEmheCOn0JSFBimAz_zzX0HF-Qq2IHJ5EbvPJFfRs5njtjYBuPp78JZ6y_vvEN0A7cvVFaVer5Z5ULwOf2eTxvHu8q6yNlffrXNF0BRbjxgVGQ3M-NamKf818idMD6A54/s72-c/omg-cat.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-217206737184460687</guid><pubDate>Fri, 06 Aug 2021 15:57:00 +0000</pubDate><atom:updated>2022-10-19T16:45:32.907+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exchange</category><category domain="http://www.blogger.com/atom/ns#">Padding Oracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyLogon</category><category domain="http://www.blogger.com/atom/ns#">ProxyOracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyShell</category><category domain="http://www.blogger.com/atom/ns#">Pwn2Own</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>A New Attack Surface on MS Exchange Part 2 - ProxyOracle!</title><atom:summary type="text">
 
   
Author: Orange Tsai(@orange_8361)
P.S. This is a cross-post blog from DEVCORE
 



  

    
        Hi, this is the part 2 of the New MS Exchange Attack Surface. Because this article refers to several architecture introductions and attack surface concepts in the previous article, you could find the first piece here:
    
    
        
            A New Attack Surface on MS Exchange Part 1 </atom:summary><link>http://orange-tw.blogspot.com/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj65D7BHYmNrg5ehrs-X9unQY25ndmwi7zxe6fZXRZkW6URdyW-ovYNsgRxRwE_ZGfDRSGCXeZPurzlotyLUlUIDhX5JYGdlht5oDmlvcTYlCQZ953Dhw0hz8VeLTqQ1qmgUTahpS3D1t4/s72-c/frame_37_delay-0.1s.png" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-674306214530021249</guid><pubDate>Fri, 06 Aug 2021 15:57:00 +0000</pubDate><atom:updated>2022-10-19T16:45:05.512+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exchange</category><category domain="http://www.blogger.com/atom/ns#">Padding Oracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyLogon</category><category domain="http://www.blogger.com/atom/ns#">ProxyOracle</category><category domain="http://www.blogger.com/atom/ns#">ProxyShell</category><category domain="http://www.blogger.com/atom/ns#">Pwn2Own</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>A New Attack Surface on MS Exchange Part 1 - ProxyLogon!</title><atom:summary type="text">

    
        Author: Orange Tsai(@orange_8361)
        P.S. This is a cross-post blog from DEVCORE
    

The series of A New Attack Surface on MS Exchange:A New Attack Surface on MS Exchange Part 1 - ProxyLogon!A New Attack Surface on MS Exchange Part 2 - ProxyOracle!A New Attack Surface on MS Exchange Part 3 - ProxyShell!A New Attack Surface on MS Exchange Part 4 - ProxyRelay!

      

    
</atom:summary><link>http://orange-tw.blogspot.com/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-eq5QtZaUfZmaP-YHZjjkvex6oUF5YKOEt-vyJP5x2BF4hLatey7CELhU8S7p6CdrxtXVw63Tw3E1HPF7myIOO7Ea90-iFBq1cRkXUC2qNhBSc4Wl6mvhAa-1drct-oO9I3WcbtWnqj8/s72-c/frame_009_delay-0.05s.png" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-6717899733046637874</guid><pubDate>Wed, 24 Feb 2021 07:00:00 +0000</pubDate><atom:updated>2021-02-24T22:07:41.643+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Binary Exploitation</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Deserialization</category><category domain="http://www.blogger.com/atom/ns#">HITCON</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>A Journey Combining Web Hacking and Binary Exploitation in Real World!</title><atom:summary type="text">

Hi, this blog post is just a short post to address the technique part in one of my Red Team cases last year. I believe it's worth sharing, so I reproduced this in my lab environment and made this topic. This topic is also presented in RealWorld CTF Live Forum&amp;nbsp;and&amp;nbsp;OWASP Hong Kong 2021 Techday. It's also on YouTube now! Although it is speaking in Mandarin, the slides and subtitles are </atom:summary><link>http://orange-tw.blogspot.com/2021/02/a-journey-combining-web-and-binary-exploitation.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_mqpzfZI39tPRx-z9ImkgCzPEuXyapZUoeD5SqL_7HqSvMJ6wtzgqWLZb3rTjfYQO-RcZeYMWgLkc-v8-v8EP4T9mcc5Ks0ifXE1TlzHHzmabxe-hXjn_T1v6XZHTTnFmaq7zQW0LChg/s72-c/image.png" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-3108587654264579897</guid><pubDate>Sat, 12 Sep 2020 09:25:00 +0000</pubDate><atom:updated>2020-09-13T16:13:33.604+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Deserialization</category><category domain="http://www.blogger.com/atom/ns#">HITCON</category><category domain="http://www.blogger.com/atom/ns#">Java</category><category domain="http://www.blogger.com/atom/ns#">MDM</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM</title><atom:summary type="text">
    Author: Orange TsaiThis is a cross-post blog from DEVCORE.&amp;nbsp;中文版請參閱這裡
    Hi, it’s a long time since my last article. This new post is about my research this March, which talks about how I found vulnerabilities on a leading Mobile Device Management product and bypassed several limitations to achieve
        unauthenticated RCE. All the vulnerabilities have been reported to the vendor and </atom:summary><link>http://orange-tw.blogspot.com/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfK2FOYmih28gM9a4_Kths-JIAuDBnHdSUlzQW67AoHhKKSJCVnJar4sGPSSzZg2BzIhK8Pi2ovLQ_R4IyIuWLpy7l4zS5yJbtELV14VOWEWJ3wmVVhvUqB1PHxLdHouva4pRqDIu8j0w/s72-c/1599655683992.png" width="72"/><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-7734075457001825871</guid><pubDate>Mon, 11 Nov 2019 10:15:00 +0000</pubDate><atom:updated>2019-12-27T07:41:16.988+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><title>你用它上網，我用它進你內網! 中華電信數據機遠端代碼執行漏洞</title><atom:summary type="text">

For non-native readers, this is a writeup of my&amp;nbsp;DEVCORE Conference 2019&amp;nbsp;talk. Describe a misconfiguration that exposed a magic service on port 3097 on our country's largest ISP, and how we find RCE on that to affect more than 250,000 modems&amp;nbsp;:P


大家好，我是 Orange! 這次的文章，是我在 DEVCORE Conference 2019 上所分享的議題，講述如何從中華電信的一個設定疏失，到串出可以掌控數十萬、甚至數百萬台的家用數據機漏洞!









前言
身為 DEVCORE 的研究團隊，我們的工作</atom:summary><link>http://orange-tw.blogspot.com/2019/11/HiNet-GPON-Modem-RCE.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAMhogtXAwC906-bTIzteVBZjM7RcnIll9PLCFvWg9rdtgFY3HFPP0R_Z64yAtrYNuqjLVQe5NRw0zf3iBufiPlNjDo4vBF7aJhhbD9VM1bVu5hOlKCo-dQfH94eA5dlVoPWzmDdNPNj8/s72-c/cover.png" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-5977903639391208144</guid><pubDate>Tue, 29 Oct 2019 16:45:00 +0000</pubDate><atom:updated>2019-10-30T22:46:40.209+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><title>An analysis and thought about recently PHP-FPM RCE(CVE-2019-11043)</title><atom:summary type="text">


First of all, this is such a really interesting bug! From a small memory defect to code execution. It combines both binary and web technique so that’s why it interested me to trace into. This is just a simple analysis, you can also check the bug report and the author neex’s exploit to know the original story :D


Originally, this write-up should be published earlier, but I am now traveling and</atom:summary><link>http://orange-tw.blogspot.com/2019/10/an-analysis-and-thought-about-recently.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDCxLVQIuONAgdyXvh__6Srvx-kTGX1Lk89q5H9lh5XsITh-8zSYJFtxEik5lFRkGMxFC7Z5Kl-VG338x-S6RJmIQ35BSLJ3v6cQ7SHXMnwcbMm52LrXqC8T5Dj6ka9rIfrzV2I2uIGGM/s72-c/xxxx.png" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-2767570323381203634</guid><pubDate>Mon, 02 Sep 2019 14:00:00 +0000</pubDate><atom:updated>2019-09-03T00:18:22.002+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">SQL Injection</category><category domain="http://www.blogger.com/atom/ns#">SSL VPN</category><category domain="http://www.blogger.com/atom/ns#">SSRF</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>Attacking SSL VPN - Part 3: The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study!</title><atom:summary type="text">


Author: Orange Tsai(@orange_8361) and Meh Chang(@mehqq_)

P.S. This is a cross-post blog from DEVCORE





Hi, this is the last part of Attacking SSL VPN series. If you haven’t read previous articles yet, here are the quick links for you:

Infiltrating Corporate Intranet Like NSA: Pre-auth RCE on Leading SSL VPNs
Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as </atom:summary><link>http://orange-tw.blogspot.com/2019/09/attacking-ssl-vpn-part-3-golden-pulse-secure-rce-chain.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr-ydgYgcfd0Xu9FTIDgsgmlg72urhbYCZk9tdbD13PU6G1-Qr5Lc587zub9PI8vr6Qu6Wc_1FlHwbGrvtz_oHS4xFj2JukbucHEBsBm-RzOwgTY-rCsq0kKVR6_UsAsnUSyJmA8owvc4/s72-c/cover%255B1%255D.png" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-6381319859462987788</guid><pubDate>Fri, 09 Aug 2019 20:53:00 +0000</pubDate><atom:updated>2019-09-02T19:32:44.706+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">SSL VPN</category><title>Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN</title><atom:summary type="text">




Author: Meh Chang(@mehqq_) and Orange Tsai(@orange_8361)
This is also the cross-post blog from DEVCORE


Last month, we talked about Palo Alto Networks GlobalProtect RCE as an appetizer. Today, here comes the main dish! If you cannot go to Black Hat or DEFCON for our talk, or you are interested in more details, here is the slides for you!

Infiltrating Corporate Intranet Like NSA: Pre-auth </atom:summary><link>http://orange-tw.blogspot.com/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazo_58XklbXqA6pQeDMkSq1lLlF52fgbQE8qAsnoEvcXlmwAMoW1zrsv_9xPdOzztqRfTqcXYBCW_08si8ydla8_DWIRaRmPafebKR_Q5TL21UYbcs99Q1TBPNPmPHG_QEXlx9xrpCTQ/s72-c/cover%255B1%255D.png" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-478025510206587411</guid><pubDate>Wed, 17 Jul 2019 12:27:00 +0000</pubDate><atom:updated>2019-07-17T20:35:49.386+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><title>Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study!</title><atom:summary type="text">





Author: Orange Tsai(@orange_8361) and Meh Chang(@mehqq_)

P.S. This is a cross-post blog from DEVCORE



SSL VPNs protect corporate assets from Internet exposure, but what if SSL VPNs themselves are vulnerable? They’re exposed to the Internet, trusted to reliably guard the only way to your intranet. Once the SSL VPN server is compromised, attackers can infiltrate your Intranet and even take</atom:summary><link>http://orange-tw.blogspot.com/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQublVbUadNZ4KiiJt9WnIryCW8OysSMq1hN0XkURFL8MA-ZG7p9oz-_GMRpMUyhVJkJksXG4xYuB_jUiPpPMgYJ3CbzMnwMC_et8kc7NOjmICou-MZEUhHf_nr3Z8RE9qIhdNRfWtlR4/s72-c/2.png" width="72"/><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-2571910671656030400</guid><pubDate>Tue, 12 Mar 2019 12:00:00 +0000</pubDate><atom:updated>2019-03-14T18:09:44.498+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CSP</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>A Wormable XSS on HackMD!</title><atom:summary type="text">


在 Web Security 中，我喜歡伺服器端的漏洞更勝於客戶端的漏洞!(當然可以直接拿 shell 的客戶端洞不在此限XD) 因為可以直接控制別人的伺服器對我來說更有趣! 正因如此，我以往的文章對於 XSS 及 CSRF 等相關弱點也較少著墨(仔細翻一下也只有 2018 年 Google CTF 那篇XD)，剛好這次的漏洞小小有趣，秉持著教育及炫耀(?)的心態就來發個文了XD

最近需要自架共筆伺服器，調查了一些市面上支援 Markdown 的共筆平台，最後還是選擇了國產的 HackMD! 當然，對於自己要使用的軟體都會習慣性的檢視一下安全性，否則怎麼敢放心使用? 因此花了約半天對 HackMD 進行了一次原始碼檢測(Code Review)!

HackMD 是一款由台灣人自行研發的線上 Markdown 共筆系統，除了在台灣資訊圈流行外，也被許多台灣研討會如 COSCUP,</atom:summary><link>http://orange-tw.blogspot.com/2019/03/a-wormable-xss-on-hackmd.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/GRi2pz6_sGY/default.jpg" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-4992859796278385546</guid><pubDate>Tue, 19 Feb 2019 12:00:00 +0000</pubDate><atom:updated>2020-02-15T00:41:39.056+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Java</category><category domain="http://www.blogger.com/atom/ns#">Jenkins</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!</title><atom:summary type="text">


This is also a cross-post blog from DEVCORE, this post is in English, 而這裡是中文版本!
#2019-02-22-updated
#2019-05-10-updated
#2019-05-10-released-exploit code awesome-jenkins-rce-2019
#2019-07-02-updated the slides is out!
---


Hello everyone!

This is the Hacking Jenkins series part two! For those people who still have not read the part one yet, you can check following link to get some basis and </atom:summary><link>http://orange-tw.blogspot.com/2019/02/abusing-meta-programming-for-unauthenticated-rce.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUGsmCoGQNVI8zxNeNFirjwZANqhMekoQYWUbENIyVEp71BtmJKME5zhq8pWvVB7Pz62y83fcVOwAU9j8BS7nt1_dJ3YiKHZaJhHZJbgCeDPU68z78KWiL0qaE5L-r7jyO1P8iwGI73lc/s72-c/pic3.png" width="72"/><thr:total>13</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-4289153678951352252</guid><pubDate>Wed, 16 Jan 2019 12:10:00 +0000</pubDate><atom:updated>2019-03-12T11:41:06.522+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">Java</category><category domain="http://www.blogger.com/atom/ns#">Jenkins</category><category domain="http://www.blogger.com/atom/ns#">SSRF</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>Hacking Jenkins Part 1 - Play with Dynamic Routing</title><atom:summary type="text">

This is a cross-post blog from DEVCORE, this post is in English, 而這裡是中文版本!
# Part two is out, please check this
---




In software engineering, the Continuous Integration and Continuous Delivery is a best practice for developers to reduce routine works. In the CI/CD, the most well-known tool is Jenkins. Due to its ease of use, awesome Pipeline system and integration of Container, Jenkins is </atom:summary><link>http://orange-tw.blogspot.com/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK7yciMVOF2HujBueFTWex7QTlqnSl6K1hsfP_-BP4VB9Z8sVZhyGpP0aDDr1gGef4PRXT0VzXXnflWH1mbwku4pU-76RDQ96Y_IbBywXTg-EU_Fz5j_Zemw_cf9ZBWvJ3xwWnJzc9SvA/s72-c/moustache-top-hat-cat.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-6842416429319259007</guid><pubDate>Tue, 23 Oct 2018 16:19:00 +0000</pubDate><atom:updated>2018-10-24T15:41:58.203+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CTF</category><category domain="http://www.blogger.com/atom/ns#">Deserialization</category><category domain="http://www.blogger.com/atom/ns#">HITCON</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>HITCON CTF 2018 - One Line PHP Challenge</title><atom:summary type="text">


In every year’s HITCON CTF, I will prepare at least one PHP exploit challenge which the source code is very straightforward, short and easy to review but hard to exploit! I have put all my challenges in this&amp;nbsp;GitHub repo&amp;nbsp;you can check, and here are some lists :P

2017 Baby^H Master PHP 2017&amp;nbsp;(0/1541 solved)
Phar protocol to deserialize malicious object
Hardcode anonymous function </atom:summary><link>http://orange-tw.blogspot.com/2018/10/hitcon-ctf-2018-one-line-php-challenge.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmtCWcdsockEb9srHfa2AUG1QTXpOEldsByADdJ00WxC9KJrS8pECxKIySCGjxd0Co55vpCM0TFrMnW0dFCmXEK3SzUwc3EIzs9S9rFfyPqKq2-0kthuMCiHNm1J9ddCrHWamaB_SFjUQ/s72-c/2018-10-23_200848.png" width="72"/><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-5488483660931122730</guid><pubDate>Fri, 10 Aug 2018 20:10:00 +0000</pubDate><atom:updated>2018-08-11T08:16:59.515+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>How I Chained 4 Bugs(Features?) into RCE on Amazon Collaboration System</title><atom:summary type="text">

Hi! This is the case study in my Black Hat USA 2018 and DEFCON 26 talk, you can also check slides here:

Breaking Parser Logic! Take Your Path Normalization Off and Pop 0days Out


In past two years, I started to pay more attention on the “inconsistency” bug. What's that? It’s just like my SSRF talk in Black Hat and GitHub SSRF to RCE case last year, finding inconsistency between the URL parser</atom:summary><link>http://orange-tw.blogspot.com/2018/08/how-i-chained-4-bugs-features-into-rce-on-amazon.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZDbzVNmE7FSG2McqHIMK7RjAGzrmN_jGCtZMm_k86200PYKf8-AhYkecDgEV27NYtKecYVucObhWkq7YGn3OSNkmxinAq3_r-b0-wXUDZ2zv_LrteliI1L8TvJkxPzT9EJLh5tV-20YQ/s72-c/2018-08-04_030230.png" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-5399632956880834840</guid><pubDate>Wed, 27 Jun 2018 07:40:00 +0000</pubDate><atom:updated>2018-06-30T03:41:26.372+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CTF</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>Google CTF 2018 Quals Web Challenge - gCalc</title><atom:summary type="text">



gCalc is the web challenge in Google CTF 2018 quals and only 15 teams solved during 2 days’ competition!

This challenge is a very interesting challenge that give me lots of fun. I love the challenge that challenged your exploit skill instead of giving you lots of code to find a simple vulnerability or guessing without any hint. So that I want to write a writeup to note this :P

The challenge</atom:summary><link>http://orange-tw.blogspot.com/2018/06/google-ctf-2018-quals-web-gcalc.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXoP-5hXx6Mv5EWb4trw8GZrFeBAbhr2FwvwniAyC3m8V8htbNeBXz4FPdSM1yGM7IQCFXF_IGrp3jAbLSGolYEYMg3Kfti169AC9NR-BlzhTXCc9sa2-NJncdWEPPHgdrQNdKZ2LTBOE/s72-c/2018-06-27_135300.png" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-5804660873018215532</guid><pubDate>Mon, 26 Mar 2018 12:00:00 +0000</pubDate><atom:updated>2018-04-02T23:10:24.280+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Deserialization</category><category domain="http://www.blogger.com/atom/ns#">Java</category><category domain="http://www.blogger.com/atom/ns#">JRMP</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>Pwn a CTF Platform with Java JRMP Gadget</title><atom:summary type="text">

打 CTF 打膩覺得沒啥新鮮感嗎，來試試打掉整個 CTF 計分板吧!
前幾個月，剛好看到某個大型 CTF 比賽開放註冊，但不允許台灣參加有點難過 :(看著官網最下面發現是 FlappyPig 所主辦，又附上&amp;nbsp;GitHub 原始碼&amp;nbsp;秉持著練習 Java code review 的精神就 git clone 下來找洞了!
(以下測試皆在 FlappyPig 的允許下友情測試，漏洞回報官方後也經過同意發文)在有原始碼的狀況下進行 Java 的 code review 第一件事當然是去了解第三方 Libraries 的相依性，關於 Java 的生態系我也在幾年前的文章小小分享過，當有個底層函式庫出現問題時是整個上層的應用皆受影響!從&amp;nbsp;pom.xml&amp;nbsp;觀察發現用了Spring Framework 4.2.4從版本來看似乎很棒沒什麼重大問題

</atom:summary><link>http://orange-tw.blogspot.com/2018/03/pwn-ctf-platform-with-java-jrmp-gadget.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDjBaQfh2xRh_Z2iG982CS4gO6ThyphenhyphenTQyW2_oXBW9obUvF9GiSod9QtPuOmaduRYjLI5q4cFL_sedT7foyh4wr9cYD1wjgHNGbF9Il6ZaRuSIKYumgIwQTaSKIhHpQ58Px8fF-2yxF61hk/s72-c/2018-01-10_190016-2.png" width="72"/><thr:total>21</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-9005955775564293093</guid><pubDate>Sun, 21 Jan 2018 15:21:00 +0000</pubDate><atom:updated>2018-01-22T01:05:06.949+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVE</category><category domain="http://www.blogger.com/atom/ns#">PHP</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>PHP CVE-2018-5711 - Hanging Websites by a Harmful GIF</title><atom:summary type="text">


Author: Orange Tsai(@orange_8361) from DEVCORE

Recently, I reviewed several Web frameworks and language implementations, and found some vulnerabilities.
This is an simple and interesting case, and seems easy to exploit in real world!

Affected
All PHP version

PHP 5 &amp;lt; 5.6.33
PHP 7.0 &amp;lt; 7.0.27
PHP 7.1 &amp;lt; 7.1.13
PHP 7.2 &amp;lt; 7.2.1




Vulnerability Details
The vulnerability is on the </atom:summary><link>http://orange-tw.blogspot.com/2018/01/php-cve-2018-5711-hanging-websites-by.html</link><author>noreply@blogger.com (Orange Tsai)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2987759532072489303.post-2630067573832743873</guid><pubDate>Fri, 28 Jul 2017 06:00:00 +0000</pubDate><atom:updated>2017-07-29T04:05:54.247+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BugBounty</category><category domain="http://www.blogger.com/atom/ns#">Github</category><category domain="http://www.blogger.com/atom/ns#">RCE</category><category domain="http://www.blogger.com/atom/ns#">WebHacking</category><title>How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!</title><atom:summary type="text">

Hi, it’s been a long time since my last blog post.

In the past few months, I spent lots of time preparing for the talk of Black Hat USA 2017 and DEF CON 25. Being a Black Hat and DEFCON speaker is part of my life goal ever. This is also my first English talk in such formal conferences. It's really a memorable&amp;nbsp;experience :P

Thanks Review Boards for the acceptance.


This post is a simple </atom:summary><link>http://orange-tw.blogspot.com/2017/07/how-i-chained-4-vulnerabilities-on.html</link><author>noreply@blogger.com (Orange Tsai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8KF4OVpkt0pn0kYjwX1q2df0kAxkNpk6u-l-bfUV7chdqykIEejPsaU1w7p3cSo1LIZlbd7Q2UcxJsXusP6-OzywOl7R6QqsPgEghsHV8OxWZ8AWphx6A3h26YQbhnIpgaT9a6kMy8-4/s72-c/final%255B1%255D.png" width="72"/><thr:total>18</thr:total></item></channel></rss>