HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really. https://airbus-seclab.github.io/ilo/SSTIC2018-Slides-EN-Backdooring_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf …
-
-
Yeah, I've done that before, I had an IP-KVM in my home lab that was EoL and it only supported SSL2.0, ended up sticking a pocket router in front of it, VPN to router, connect to KVM.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Just scanned the project sources on my disk for scanf+%s, found them "just" in tests and examples. Not optimal since such codes tends to be copy&pasted
@bagder. -
I fear those are items listed on place 17 and below on my personal TODO list and new things to work on tend to appear above it...
- Show replies
New conversation -
-
-
This Tweet is unavailable.
- End of conversation
-
-
-
You just WAF'd :)
-
WAFs are bullshit. Vulnerable apps will always be vulnerable. The goal here isn't to snake-oil paper over trivial exploits in bypassable ways, the point is to have a solid authentication step behind which to shove all the vulnerable mess.
End of conversation
New conversation -
-
-
How often is sscanf implemented insecurely?
-
100% of the time. It's insecure by spec.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.