Cyber Security Research

Read the latest security research from the white hat hacking team at Intruder

Path Traversal and Code Execution in CSLA.NET (CVE-2024-28698)

Path Traversal and Code Execution in CSLA.NET (CVE-2024-28698)

July 19, 2024
Sam Pizzey
CSLA.NET is a framework that helps structure business logic for .NET applications into re-usable objects, and share those objects between systems. During a penetration test last year, we discovered an interesting path traversal vulnerability affecting applications using this framework. Read on for a technical explanation of how this vulnerability works.
Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari

Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari

December 6, 2023
Daniel Thatcher
This is the second post in a two-part series on DNS rebinding. In this post, I introduce new techniques for achieving reliable, split-second DNS rebinding in Chrome, Edge, and Safari when IPv6 is available, as well as a technique for bypassing the local network restrictions applied to the fetch API in Chromium-based browsers.
We Hacked Ourselves With DNS Rebinding

We Hacked Ourselves With DNS Rebinding

December 1, 2023
Daniel Thatcher
This post is the first in a two-part series on DNS rebinding in web browsers. In this post, I will talk about a bug we found in our own product which allowed us to retrieve low-privileged AWS credentials using DNS rebinding. In the next post, I will share new techniques to reliably achieve split-second DNS rebinding in Chrome, Edge, and Safari, as well as bypass Chrome's restrictions on requests to private networks.‍
Detecting Server-Side Prototype Pollution

Detecting Server-Side Prototype Pollution

February 15, 2023
Daniel Thatcher
Prototype pollution bugs have been a feature in many CTFs in recent years, and real-world examples in open-source applications have led to impactful exploits such as remote code execution and denial-of-service. The discovery of these bugs has long relied on access to source code, with no safe black-box detection techniques being widely used.
In GUID We Trust

In GUID We Trust

October 11, 2022
Daniel Thatcher
GUIDs (often called UUIDs) are widely used in modern web applications. However, seemingly very few penetration testers and bug bounty hunters are aware of the different versions of GUIDs and the security issues associated with using the wrong one.
Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond

Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond

November 10, 2021
Daniel Thatcher
Modern web applications typically rely on chains of multiple servers, which forward HTTP requests to one another. The attack surface created by this forwarding is increasingly receiving more attention, including the recent popularisation of cache poisoning...

Sign up for your free 14-day trial

7 days free trial