Tag: vulnerability

55 articles
Date Tue 25 June 2024
Author Mathieu Farrell
Category Pentest

Discovery of two vulnerabilities (CVE-2024-34065) in Strapi, an open source content management system. In this post we explain how these vulnerabilities, if chained together, allow authentication to be bypassed.

Date Wed 17 April 2024
Author Philippe Teuwen
Category Cryptography

Passbolt, an Open Source Password Manager, is using the Pwned Passwords service from HaveIBeenPwned to alert users if their password is present in a previous data breach. Pwned Passwords API is based on a mathematical property known as k-Anonymity guaranteeing that it never gains enough information about a non-breached password hash to be able to breach it later. Sounds good, right?

Date Thu 21 March 2024
Author Mathieu Farrell
Category Pentest

The following article explains how during a Red Team engagement we were able to develop a 1day for GLPI CVE-2023-43813 which later led to the identification of an arbitrary object instantiation leading to an SSRF referenced as CVE-2024-27098 as well as an SQL injection referenced as CVE-2024-27096.

Date Tue 16 January 2024
Authors Francisco Falcon, Iván Arce
Category Vulnerability

This blog post provides details about nine vulnerabilities affecting the IPv6 network protocol stack of EDK II, TianoCore's open source reference implementation of UEFI.

Date Tue 07 November 2023
Authors Eloïse Brocas, Damien Cauquil, Robin David, Benoît Forgette
Category Vulnerability

Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest.

Date Mon 21 August 2023
Authors Sami Babigeon, Benoît Forgette
Category Vulnerability

In this blog post, we present a new vulnerability on the Gecko Bootloader from Silicon Labs more precisely inside the OTA parser.

Date Fri 23 June 2023
Author Gwaby
Category Exploitation

In this blog post we'll see a technique to gain code execution in SMM from a very limited write primitive.

Date Fri 31 March 2023
Authors Sébastien Rolland, Mahé Tardy
Category Vulnerability

This article provides a brief overview of how Microsoft Open Management Infrastructure (OMI) works, as well as two vulnerabilities that the Quarkslab Cloud team identified through fuzzing techniques.

Date Fri 24 March 2023
Authors Eloïse Brocas, Damien Cauquil, Robin David, Benoît Forgette
Category Vulnerability

A journey into the Pwn2Own contest. Part 1: Netgear RAX30 router WAN vulnerabilities

Date Tue 14 March 2023
Author Francisco Falcon
Category Vulnerability

In this blog post we discuss the details of two vulnerabilities we discovered in the Trusted Platform Module (TPM) 2.0 reference implementation code. These two vulnerabilities, an out-of-bounds write (CVE-2023-1017) and an out-of-bounds read (CVE-2023-1018), affected several TPM 2.0 software implementations (such as the ones used by virtualization software) as well as a number of hardware TPMs.