This is the vulnerability that had curl maintainers cut an early release, slated for October 11. github.com/curl/curl/disc…
The test data included in the patch makes it clear enough to poke and play with this.
For some super quick local testing, you can slap up a simple SOCKS5 proxy kudos to "pysoxy": github.com/MisterDaneel/p…
And sure, you can stage a dumbo easy redirect (php -S 0.0.0.0:8000 or whatever) and then use curl to drive through the SOCKS proxy to that redirect....
And yeah, you can use curl with -v to see the same error message that was patched out from the diff, so we're in the right spot...
But, if the risk is supposed to be curl switching to local resolve...
Maybe I'm dumb, but what damage does that do?
Sure you could append in some local resources you might "enumerate", but couldn't you already do that with SOCKS to begin with?
It's not ever likely for there to be a local name with over 255 characters, right? So you'd drive to a new location with @ if the goal to enumerate local resources, but how is that any different than just reaching that in the first place?
How do you actually weaponize this?
I'm out of my element at this point so forgive my nonsensical garbage babble, but, since it does store the whole hostname in a buffer, you could presumably do some funky stack stuff.
With a 2036-character long URI, it looks to be the limit of what is displayed in verbose info
kek, could force a URL too long or drain memory
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Luke shared the URL from the original phishing email with me, so I'd like to showcase it a bit.
Planning to record a video to walk through it, but don't have a chance to record for the next few hours... so will roll with a Twitter/X thread for now 🧵
I won't show the full URL, but here's the big link redacted and defanged.
Cutesy that it is from a SendGrid tracking link. Obviously a juicy treat for attacker to be able to mass spam emails with a trusted/common delivery service like SendGrid, and a perk of click tracking.
Of course, it's a 302 redirect to the malicious domain and actual credential harvesting website.
Again I won't show the full URL right now, but will be reporting to the domain registrar/usual disclosure process
CrowdStrike Falcon agents are imploding right now and causing a Blue Screen of Death boot loop on every endpoint. Reports of massive outages globally. reddit.com/r/crowdstrike/…
I'd love to be able to see their messaging, but it is behind a login.
Presumably the status update is just "we are aware", but no further details of what is wrong/how to remediate/etc.
Want to know what a YouTube channel with half a million subscribers looks like behind the scenes?
As we're cruising into 2023 and the new year, I'd like to peel back the curtain.
I want to be as transparent as possible here, in the hopes that this might help other creators. 🧵
This year in 2022, I uploaded ~170 videos, with most being released in the latter half of the year.
Trying with a certain of amount of grace and dignity, I did lean into the "cringy" thumbnails with the exaggerated expressions or more modern titles.
But please, "don't hate the player... hate the game" -- I really do think these thumbnails and titles added to greater reception and viewership of my content.
The past 28 days made for 1M comprehensive views, 100K watch hours, +11K subscribers and 20M impressions.