Show newer

I investigated the inner workings of 's Mint Browser and summarized it in a blog article. In short: it's as bad as the Forbes article suggests, and even worse. That browser is spyware, exfiltrating an enormous amount of data.

Pro-tip when running a vulnerability disclosure program: rejecting mails with "malicious" attachments is not a good idea. You might also want to test this in advance and adjust configuration accordingly. Or at least provide an alternative way of uploading PoCs.

Long article doing a great job summing up typical issues with bug bounties, with providing valuable insights. Particularly "buying researches silence" is the reason I barely do bug bounties any more.

Yahoo! and AOL implement an account recovery flow which can be summed up as "please hijack me." If you use them, you are better be very certain you control that recovery phone number of yours.

Want do use for a new project? Don't, it makes writing secure code unnecessarily complicated. In fact, you should look for a way to get rid of it in your old projects as well, or at least minimize its potential security impact.

Vulnerability in McAfee WebAdvisor: RCE from any website through the browser extension into the application, all the way to administrator privileges. Updates are finally available and should be installed ASAP.

Does anyone here have experience with Responsible Vulnerability Disclosure via Does it actually work? As in: do they manage to notify the right people to get the vulnerability fixed? What about non-website vulnerabilities?

I know that everybody is tired of me talking about but this time it's a beefy RCE vulnerability. Avast Secure Browser could be trivially taken over by any website, allowing even execution of arbitrary OS commands.

Did you expect "Avira Browser Safety" to offer you shopping deals? Me neither, and I also didn't expect this to be implemented by running remote code in the context of the extension or any website. @Avira

My first article on antivirus, detailing a bunch of issues rendering its web protection component ineffective. There will be more interesting findings to publish later.

There is a high-level overview for this article as well now, if you only want the important stuff about these Kaspersky vulnerabilities without the technical details.

Show thread

Found yet another big name browser extension using carelessly, resulting in an vulnerability. Can't we all just agree that jQuery is a security footgun and switch to modern frameworks?

Same as yesterday's blog post but as a high-level overview without the technical details: Kaspersky applications do not protect an internal API properly, allowing any website to send commands. Yes, websites can still do it, merely with less impact.

I'll publish two blog posts on Kaspersky vulnerabilities this week, first one is now up. Here I demonstrate hijacking communication channels that the "Web Protect" component uses to communicate with the antivirus application.

Ok, I'm in - arbitrary website executing code in the background page of the extension and getting access to all these privileges. Time to notify the vendor...

Show thread

Looking into and they demonstrate that solutions breaking up HTTPS connections don't have to take over the invalid certificate page. So no security issues like the ones seen in software.

Tavis Ormandy considers LastPass to be the best you can get as far as online password managers go. His experience is clearly different from mine, but if that's true, we are all screwed and there is no product which can be recommended.

Wrote an article on three vulnerabilities introduced by Internet Security - a very typical scenario for antivirus vendors who will break up secure HTTPS connections in order to inspect them.

I'm having a discussion with a vendor, maybe you can help me out. What's the goal of a security advisory?

I tried producing some useful instructions for less experienced people to recognize flaws in password managers. Let me know whether it worked!

Show older
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.