[bounty] Spring4Shell, PEAR Bugs, and GitLab Hardcoded Passwords
Description
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/spring4shell-pear-bugs-and-gitlab-hardcoded-passwords.html
This week we have some fun with some bugs that really shouldn't have passed code-review, we of course talk about Spring4Shell/SpringShell and dive into the decade long history of that bug, and a bit of discussion about triaging more subtle bugs.
[00:00:29 ] [Stripe] CSRF token validation system is disabled
[00:09:42 ] GitLab Account Takeover with Hardcoded Password
[00:21:22 ] Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring
[00:37:49 ] PHP Supply Chain Attack on PEAR
[00:52:16 ] Finding bugs that doesn’t exists
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
- Mondays at 3:00 pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
- Tuesdays at 7:00 pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.