Links for 2025
Here are some links I thought were interesting from the past year.
- ZendTo NDay Vulnerability Hunting - Unauthenticated RCE in v5.24-3 <= v6.10-4: Jay checked ZendTo’s changelog for security fixes and rediscovered an RCE fixed in 2021. When uploading a file, PHP saves it to a temporary file and puts the filename in
$_FILES['tmp_name']. This is the only trusted input field in what normally consists of user input. ZendTo mixes data in$_FILESwith posted data from$_POST, making it possible to overwrite the temporary file name. Since this file name is used in a shell command, it results in RCE. - Impossible XXE in PHP: Aleksandr exploits XXE, bypassing four different security features and diving into the libxml2 source code to do so.
- Introducing lightyear, a new way to dump PHP files: PHP filter chains again, with blind exfiltration.
- Getting RCE on Monero forums with wrapwrap: more PHP filter chains, which are now used to make a PHP file look like an image so that it will pass the server-side validation and is offered for download by the server.
- Avoiding downtime: modern alternatives to outdated certificate pinning practices: certificate pinning has its problems, especially when the certificate lifetime is going to be reduced in the coming years. This post describes that pinning is no longer cool, and how to correctly secure your certificates. Certificate pinning slightly increases security while providing big availability risks. Because the security department is only judged on security and not on availability, they will argue in favor of security pinning, even though it could be a net negative. Also, companies typically misjudge how good they are in managing certificates correctly.
- The double standard of webhook security and API security: this post is trash. The post it links in the first sentence is also trash. However, it poses a good question: what are the security benifits (if any) of signing requests. If there are none, why do so many applications use signed requests? Can we confidently say that API keys are sufficiently secure?
- Safe JSON in script tags: How not to break a site. Using JSON-encoded server variables within a
<script>tag is not necessarily safe against XSS. Even though quotes are escaped, if the variable contains</script>, it closes the script tag and can inject new tags. The situation becomes even more complicated with HTML comments. This article explains how it works exactly and how to correctly encode JSON within script tags. - Hacking Formula 1: Accessing Max Verstappen’s passport and PII through FIA bugs. Basically they submit
isAdmin=trueto their user profile to gain administrator privileges.