$20,000 RCE in GitLab via 0day in exiftool metadata processing library CVE-2021-22204

Поделиться
HTML-код
  • Опубликовано: 15 июл 2024
  • ✉️ Get the 6th issue of the newsletter: mailing.bugbountyexplained.com/6
    📧 Subscribe to BBRE Premium: bbre.dev/premium
    📣 Follow me on Twitter: bbre.dev/tw
    🖥 Get $100 in credits for Digital Ocean 🖥
    m.do.co/c/cc700f81d215
    This video is an explanation of bug bounty report submitted to GitLab by William Bowling. The vulnerability was a remote code execution by a malicious image metadata. The bug existed in exiftool library and was assigned CVE-2021-22204.
    Report:
    hackerone.com/reports/1154542
    devcraft.io/2021/05/04/exifto...
    Reporter's twitter:
    / wcbowling
    Follow me on twitter:
    / gregxsunday
    Timestamps:
    00:00 Intro
    00:54 What is metadata?
    02:41 How exiftool handled \"
    06:16 The exploit
  • НаукаНаука

Комментарии • 21

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 года назад +2

    Hi you! Welcome to the comment section. I hope you liked the video😏
    Sign up for BBRE newsletter here to receive the next premium issue for free: mailing.bugbountyexplained.com/

  • @-bubby9633
    @-bubby9633 2 года назад

    Amazingly explained as usual! To think that one tiny detail (i.e. $ being end of string of a newline char) was the course of a 0-day. Didn't even know that simple detail about $ myself but will definitely use it from here on out. Just shows how important regex knowledge is when it comes to bug hunting

  • @vassoharalambous5982
    @vassoharalambous5982 3 года назад

    Amazingg content as usual! makes you think about how many other vulnerabilities exisit

  • @soumyapoddar4711
    @soumyapoddar4711 3 года назад

    Thank you

  • @kakishare9237
    @kakishare9237 3 года назад

    wow thnks man

  • @ahmadshami5847
    @ahmadshami5847 3 года назад +4

    jeez Regex bugs are really something when it comes to critical vulnerability! Yet I couldn't get my head around the complexity of the Regex rules 😂. anyways great video really well explained 👌👌

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +2

      yeah regexes are everywhere. They are not as hard as they seem and it's worth the time to learn them

    • @ahmadshami5847
      @ahmadshami5847 3 года назад

      @@BugBountyReportsExplained yes I am trying my best, but I wanna ask you if you know of any online labs that offer online labs of vulnerable Regex apps cuz I tend to learn from online labs more

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +2

      @@ahmadshami5847 I think you should do normal regex lessons and once you understand them you will be able to find vulnerable regexes in many different vuln classes

    • @ahmadshami5847
      @ahmadshami5847 3 года назад

      @@BugBountyReportsExplained okay cool thanks man 👌

  • @cybersecurity3523
    @cybersecurity3523 3 года назад

    Good bro

  • @imherovirat
    @imherovirat 2 года назад

    Straight above the head

  • @marcinphone6162
    @marcinphone6162 3 года назад +1

    Could you scale the screenshoot to whole screen. It will be useful for mobile watching. Thx

  • @alissonpelcer4317
    @alissonpelcer4317 3 года назад

    How i can learn bug bouty zero to advanceed? u pass path?

    • @united1206
      @united1206 3 года назад

      Be optimized or you will fail