Opens profile photo
Follow
Click to Follow ulldma
Peter Stöckli
@ulldma
Security Researcher and Software Engineer @ulldma@infosec.exchange
SwitzerlandJoined March 2011

Peter Stöckli’s Tweets

Mit dem Sieg im #Glasfaserstreit erhalten wir von Swisscom eine Parteientschädigung von CHF 10'000. Mit dem Geld spenden wir Global NOG Alliance 2 Spleissgeräte für die Ukraine. 🇺🇦 Spenden kann man direkt unter: bit.ly/nogalliance #ChooseYourInternet #KeepUkraineConnected
3
169
Thanks to and for helping us by reporting a serious security vulnerability. We take security very seriously and managed to patch the issue within one hour. You can find more details about the vulnerability in the quoted article.
Quote Tweet
GHSL-2022-069: Remote Code Execution (RCE) in CircuitVerse - CVE-2022-36038 securitylab.github.com/advisories/GHS
18
With CodeQL for Ruby out of Beta, we are including it as part of the supported languages for our CodeQL Bug Bounty program. To celebrate, Ruby submissions will be awarded special bonuses. Learn more 🔗 securitylab.github.com/bounties/
Quote Tweet
GitHub Codespaces for all, GitHub Copilot for Business, improved code navigation on GitHub.com, and much, much more. 🚀 Check out all the exciting updates that we announced today at #GitHubUniverse: github.blog/2022-11-09-eve
10
📣 I am extremely proud to share that this is publicly available now! the goal of this initiative at the is to help researchers while they're disclosing vuls to open source projects and provide guidance and support 💜
Quote Tweet
Coordination is Key! New Guide for Security Researchers to Coordinate Vulnerability Disclosures with #OSS Projects provides valuable best practices on how Finders can best engage & work with the open source community on discovered vulnerabilities hubs.la/Q01mnyBg0 #OSSummit
Image
9
„Please run this code for a suprise“ 🥲 (It might be time to think about where you want to run code from the Internet. Hint: it‘s probably not your local machine with all your files, plain text tokens, etc.)
Quote Tweet
#Engineers, pls run this .py code for a surprise print('\n'.join ([''.join ([('Engineer'[(x-y)%8 ] if((x*0.05)**2+(y*0.1)**2-1) **3-(x*0.05)**2*(y*0.1) **3<=0 else' ') for x in range(-30,30)]) for y in range(15,-15,-1)]))
1
CVE-2022-33980 RCE in Apache Commons Configuration. Note that the underlying cause: Common Text `StringSubstitutor` makes a great gadget to bypass block lists where `ScriptEngineManager` or the whole `javax` namespace are forbidden
2
140
Rapid7 just released a blog post for a vulnerability in Ruby-MySQL that we originally reported last year as an Metasploit issue.
Quote Tweet
A new vuln disclosure, "CVE-2021-3779: Ruby-MySQL Gem Client File Read (FIXED)," is live on our blog. Read more about impact and remediation via Rapid7 Director of Research, @todb: r-7.co/3xVcvTw
11
Slides and video from my Fuzzing USB with Raw Gadget talk at . 🤖 Raw Gadget — a new interface for emulating USB devices 🪶 Fuzzing via virtual controllers 🔌 Reproducing bugs via Raspberry Pi Zero Slides: docs.google.com/presentation/d Video:
1
84
I was reversing a Scala app and wondered if there were any specific ways to invoke commands that aren't in Java. Turns out there are! And what about the other JVM languages? 🤔 I nerd-sniped myself with that question yesterday evening and here's the output
1
107
Awesome to see Jann using Raw Gadget for implementing USB exploits! More USB bugs Jann found: bugs.chromium.org/p/project-zero Raw Gadget instructions and examples: github.com/xairy/raw-gadg
Quote Tweet
Linux USB: usbnet tells minidrivers to unbind while netdev is still up, causing UAFs bugs.chromium.org/p/project-zero
24
The easiest way to setup a headless Raspberry Pi securely in 2022 is to use the Imager application. It allows you to preconfigure a public key for SSH access. (The default user/password combination has been removed in the newest Raspian images.)
Image
1
1
Show this thread