I looked into the Ninja Cookie extension and found it really sloppy with security. I don’t know why after three months they only managed to address the biggest issue, they never wrote back after acknowledging my initial report.

palant.info/2021/05/04/univers

The Print Friendly & PDF browser extension allowed any website to completely take over the extension. Considerable attack surface remains, and Firefox version is still vulnerable (exploitation slightly more complicated there).

palant.info/2021/04/13/print-f

Disclosure time: two fairly typical vulnerabilities in DuckDuckGo Privacy Essentials. One is still unresolved on Firefox and Edge but can only be exploited from their server.

palant.info/2021/03/15/duckduc

Amazon Assistant extension turned out to be designed in a very “special” way: all of its logic is located on Amazon web servers. This gives Amazon access to a very wide range of information in browsers of extension’s users.

palant.info/2021/03/08/how-ama

Those of you who report security vulnerabilities, do you also request identifiers for them? Maybe also explain in comments how the overhead is worth it for you. I’m still undecided on the topic.

Oh, and by the way: can we make “thou shalt not sanitize HTML with regexps” a thing? It seems that not everybody heard that yet…

I realized today that some applications out there still use for non-legacy reasons. I really have no idea why anybody would do that in year 2020. It’s a very questionable decision security-wise, and it has no usability benefits either.

people might find the concept familiar:

> “Swiss cheese model” for prevention - no layer alone is sufficient, but ALL layers together will limit leaks through the holes! 🧀 😋

twitter.com/jkwan_md/status/13

The data collected by the Microsoft Bing mobile app was apparently exposed to anybody looking. And while this is bad enough by itself, the question to ask is always: why was it necessary to collect such detailed data?

wizcase.com/blog/bing-leak-res

Publishing details of some BullGuard Antivirus and Secure Browser vulnerabilities. Contacting to report these was rather tough, but all is fixed now and I am good to publish - one week before 90 days deadline.

palant.info/2020/07/06/dismant

You know, I rarely look into binary code, my reverse engineering skills being rudimentary. I mostly investigate the JavaScript code of applications. So I am amazed by the fact that I published three (!) RCE vulnerabilities in antivirus applications this year. 1/5

A vulnerability with the unspectacular official title "Insufficient URL sanitization and validation in Safepay Browser" actually allowed any website to take over your computer - from any browser, thanks to Online Protection feature.

palant.info/2020/06/22/exploit

When you do coordinated disclosure, do you also see companies pushing announcements of big scary vulnerabilities to a Friday? If so, how do you deal with it?

announced cloud-based backups a month ago, so I am late to the party. Still, I wanted to write down some notes on why 4 digit PINs aren't going to provide real security, no matter how hard one tries.

Thanks to @leip4Ier for bringing this topic to my attention.

palant.info/2020/06/16/does-si

I started recording accounts unfollowing me in November last year. One thing became clear however: a very common reason for an unfollow on Twitter is the account being deleted or suspended. I wonder whether that's usual or merely due to so many people following me...

I investigated the inner workings of 's Mint Browser and summarized it in a blog article. In short: it's as bad as the Forbes article suggests, and even worse. That browser is spyware, exfiltrating an enormous amount of data.

palant.info/2020/05/04/are-xia

Pro-tip when running a vulnerability disclosure program: rejecting mails with "malicious" attachments is not a good idea. You might also want to test this in advance and adjust configuration accordingly. Or at least provide an alternative way of uploading PoCs.

Long article doing a great job summing up typical issues with bug bounties, with @k8em0@twitter.com providing valuable insights. Particularly "buying researches silence" is the reason I barely do bug bounties any more.

csoonline.com/article/3535888/

Yahoo! and AOL implement an account recovery flow which can be summed up as "please hijack me." If you use them, you are better be very certain you control that recovery phone number of yours.

palant.de/2020/03/09/yahoo-and

Want do use for a new project? Don't, it makes writing secure code unnecessarily complicated. In fact, you should look for a way to get rid of it in your old projects as well, or at least minimize its potential security impact.

palant.de/2020/03/02/psa-jquer

Show older
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.