Discovering Shadow Vulnerabilities in Popular Open-Source Projects A Journey Through Reverse-Fuzzing

  Рет қаралды 224

OWASP Foundation

OWASP Foundation

Күн бұрын

Speaker Slides: static.sched.c...
In a world full of vulnerabilities, there is an untold story of those libraries that are insecure by design. For example, libraries that by using them in a certain way, the application could be compromised. Not all libraries' security issues are treated as vulnerabilities and addressed with a patch or CVE, hence addressed with minor documentation warnings at best. These vulnerabilities pose a significant risk to organizations as they are nearly impossible to detect, we named them "Shadow Vulnerabilities".
We discovered a new shadow vulnerable code pattern in a widely used OSS library and wondered who might be vulnerable.
We developed a tool that automatically analyzed more than 100k repositories to determine whether each repository is vulnerable and prioritized them based on their potential to create vast damage. We were able to validate the exploitability of hundreds of high-profile targets such as Apache Cassandra, Prometheus, PyTorch, and many more…
In this presentation, we will review the discovered vulnerabilities, and discuss the challenges of scaling the triage, validating exploitation, and building a reliable infrastructure. We will use Apache Cassandra to demonstrate how we validated the attack vector for each target, sharing the exploitation details of the critical RCE we found, and its implications on a database-as-a-service used by multiple cloud providers.
Both project owners and library owners claimed the responsibility to use it “safely” is on the users themselves. The result is that most users are vulnerable and have no process to fix this or even be aware of it.
We believe it is vital to raise community awareness of shadow vulnerabilities, as we only scratched the surface with one example out of many more that are still out there.
Guy Kaplan
Oligo Security
Security Researcher
Guy Kaplan is a Security Researcher in the CTO Office of Oligo Security. His experience in software development and vulnerability research spans more than a decade. In his previous jobs, Guy held various roles in various cyber security startups in which he acquired skills in vulnerability research and exploitation as well as software development on a variety of platforms. Guy served as a security researcher and engineer with the Israeli Defense Forces Intelligence. Whenever Guy is not breaking things for profit, he loves scuba diving.
Gal Elbaz
Oligo Security
Co-Founder and CTO
Gal is the co-founder and CTO at Oligo Security, where he leverages his decade-long experience in vulnerability research and ethical hacking. Previously, he served as a Senior Security Researcher at CheckPoint, specializing in vulnerability research, exploitation, and fuzzing across various platforms.
His journey in cybersecurity began in the Israeli Defense Forces' Intelligence unit, where he held the role of a security researcher and engineer. When not 'breaking things' for his work, Gal spends his free time playing in Capture The Flag (CTF) competitions, constantly honing his cybersecurity skills.
Managed by the OWASP® Foundation
owasp.org/

Пікірлер
ASVS Testing: You Keep Using Those Words
43:12
OWASP Foundation
Рет қаралды 347
#behindthescenes @CrissaJackson
0:11
Happy Kelli
Рет қаралды 27 МЛН
Хаги Ваги говорит разными голосами
0:22
Фани Хани
Рет қаралды 2,2 МЛН
Вопрос Ребром - Джиган
43:52
Gazgolder
Рет қаралды 3,8 МЛН
Ful Video ☝🏻☝🏻☝🏻
1:01
Arkeolog
Рет қаралды 14 МЛН
Hostinger vs Bluehost - 5 Must Know Differences for 2025
2:07
Create WP Site
Рет қаралды 1,3 М.
Why Your Backend Shouldn't Serve Files
19:40
Boot dev
Рет қаралды 44 М.
Justice Summit 2024- Creation Justice Workshp with Jared Sittig
32:19
The Justice Network of the Free Methodist Church
Рет қаралды 8
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
24:11
LiveOverflow
Рет қаралды 64 М.
Why Roblox Loses Billions
13:04
Wall Street Millennial
Рет қаралды 75 М.
New OWASP API Top 10 for Hackers
29:43
InsiderPhD
Рет қаралды 10 М.
The Only Unbreakable Law
53:25
Molly Rocket
Рет қаралды 349 М.
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 53 М.
#behindthescenes @CrissaJackson
0:11
Happy Kelli
Рет қаралды 27 МЛН