Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SO
solidsnail @infosec.pub
Posts 10
Comments 7
npm search RCE? - Escape Sequence Injection
  • That is very true.
    I do think that there's more depth to it than that. For example, dealing with it on the end of the terminal will probably break compatibility, and dealing with it on the app end will require every single dev to start sanitizing this. The challenges are real.

  • blog.solidsnail.com npm search RCE? - Escape Sequence Injection

    How many programmers does it take to filter out 36 characters? You may think this is an opening to a joke, but it’s not.

    npm search RCE? - Escape Sequence Injection
    0
    blog.solidsnail.com npm search RCE? - Escape Sequence Injection

    How many programmers does it take to filter out 36 characters? You may think this is an opening to a joke, but it’s not.

    npm search RCE? - Escape Sequence Injection
    2
    blog.solidsnail.com It’s not a Feature, It’s a Vulnerability

    It takes a special kind of person to name a company after their own body part. Fortunately the Microsoft Security Response Center doesn’t seem to have inherited that kind of mentality, because when I have reported not a bug but a feature as a vulnerability - they accepted it.

    It’s not a Feature, It’s a Vulnerability

    cross-posted from: https://infosec.pub/post/5707149

    > I talk about a report I've made to MSRC in the beginning of the year regarding vscode. > > It's a bit different. There's no in depth technical stuff, because I basically just reported the feature, not a bug.

    0
    blog.solidsnail.com It’s not a Feature, It’s a Vulnerability

    It takes a special kind of person to name a company after their own body part. Fortunately the Microsoft Security Response Center doesn’t seem to have inherited that kind of mentality, because when I have reported not a bug but a feature as a vulnerability - they accepted it.

    It’s not a Feature, It’s a Vulnerability

    I talk about a report I've made to MSRC in the beginning of the year regarding vscode.

    It's a bit different. There's no in depth technical stuff, because I basically just reported the feature, not a bug.

    0
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    cross-posted from: https://infosec.pub/post/2466014

    > This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    4
    Exploit Development @infosec.pub solidsnail @infosec.pub
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    cross-posted from: https://infosec.pub/post/2466014

    > This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    0
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    cross-posted from: https://infosec.pub/post/2466014

    > This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    0
    /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml solidsnail @infosec.pub
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    cross-posted from: https://infosec.pub/post/2466014

    > This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    0
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    cross-posted from: https://infosec.pub/post/2466014

    > This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    0
    blog.solidsnail.com From Terminal Output to Arbitrary Remote Code Execution

    It was the year of the Linux desktop 1978. Old yellowed computers were not yet old, nor yellowed. Digital Equipment Corporation released the first popular terminal to support a standardized in-band encoding for control functions, the VT100.

    This is my first write-up, on a vulnerability I discovered in iTerm2 (RCE). Would love to hear opinions on this. I tried to make the writing engaging.

    0
    Which browsers are best for privacy?
  • I think they're lacking explanation of what the data means.

    This can be very nuanced, and dependent on your goals.

    For example, in the context of fingerprinting, sometimes it's better to provide fake data instead of no data, because that itself can be a unique characteristic.