GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Will Dormann (wdormann@infosec.exchange)

  1. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Wednesday, 14-May-2025 02:37:45 JST Will Dormann Will Dormann

    Ooh, another of my NTFS vulnerabilities that I reported years ago was patched today. 🎉
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707

    In conversation about 4 days ago from infosec.exchange permalink
  2. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Wednesday, 14-May-2025 00:22:47 JST Will Dormann Will Dormann

    I'm at a meeting hosted by somebody else where they're using Microsoft Teams, and in the chat I attempted to share an image that is on my laptop. By clicking the + button and Attach file.

    The result of doing this is that Teams puts the image in MY COMPANY'S SHAREPOINT SERVER, and nobody else in Teams can see the image because they DON'T HAVE AN ACCOUNT on my company's SharePoint server. 🤦♂️

    Wonders:
    1) Has anybody at Microsoft actually tried using Teams?
    2) Why do people choose to use Teams?

    Aside: If you copy an image and press Cmd - V to put the image in the chat, Teams actually... puts the image in the chat.

    In conversation about 4 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/501/201/358/592/222/original/03cbbcbea6ab57d9.png
  3. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Tuesday, 13-May-2025 03:23:55 JST Will Dormann Will Dormann

    It's fruit update time.
    https://support.apple.com/en-us/100100

    In conversation about 5 days ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Apple security releases - Apple Support
      This document lists security updates and Rapid Security Responses for Apple software.

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/496/091/652/470/910/original/31285c09c3d0fc9c.png
  4. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Friday, 09-May-2025 13:13:52 JST Will Dormann Will Dormann
    in reply to
    • Brian Clark

    @deepthoughts10
    No, Tamper Protection does nothing to stop this.

    In conversation about 8 days ago from infosec.exchange permalink

    Attachments


  5. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Friday, 09-May-2025 05:10:21 JST Will Dormann Will Dormann

    Neat way to disable Windows Defender (or possibly other AV products)...

    Register a no-op AV product in the Windows Security Center (WSC). This action is protected by an NDA that AV vendors sign, and, well...

    Anyway, yeah, admin users can do admin things. Don't forget that.

    https://github.com/es3n1n/defendnot

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/474/016/191/416/836/original/c1cc0ab02f3454bc.png
  6. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
    in reply to

    Oh, what's that?
    'NICIPConfigUpdateDeployment-1745511600265' is not valid?

    Oh, let me put my Azure translation hat on. Ok, got it:

    You have exceeded your limit of 10 publicly available IP addresses. Please first Disassociate the IP address and then delete it. Otherwise you will get another error message.

    Boy, this hat is useful.
    Just kidding. There's no such hat.
    You need to trudge through things until you brute-force figure things out.

    Time to go touch grass...

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/394/045/439/163/623/original/30076432cca1f602.png
  7. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
    in reply to

    What's that?

    The "Most used by Azure users" VM type that I picked isn't available?

    You know what, instead of Go Fish, maybe tell me what I can use?

    Edit: Azure Spot pricing apparently isn't a thing. No matter which Size + Region combination you choose, you'll get an error that says that the combo isn't available where you want it. 🤦♂️

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/820/926/795/345/original/5559760f76334056.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/821/371/981/644/original/c122cb0b6873f44a.png
  8. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
    in reply to

    What's that? I need to remove the number of data disks in my VM? Maybe tell me how to do this?

    Ohhhh... You've selected an Azure VM image that requires more than 4 disks, and the VM type currently selected has only 4 disks? I'm no UI/UX expert, but maybe just TELL ME THIS?

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/791/242/538/845/original/68441ab2dff3f3c5.png
  9. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann

    If you create an ARM VM in Azure, beware that your "Recently used size" will be ARM, and as such you will not be able to create any preconfigured x64 VMs.

    Because of course if your "Recently used size" is ARM, Microsoft will disable the ability to pick an x64 size. 🤦♂️

    Yes, I had to create a sacrificial x84 VM in Azure to work around this. Once my recently used size was x64, I was able to pick any size that I wanted.

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/047/299/710/original/b8c83e056a7bd900.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/464/816/983/original/b2b5148efbc9de3f.png
  10. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Will Dormann Will Dormann
    in reply to

    Now that I have a local copy of the Commvault VM so that I don't burn truckloads of Azure dollars, I can look at things at my leisure.

    AND, it seems that the VM that I have is 11.38.25, which contains the fix for CVE-2025-34028.

    EXCEPT the exploit for CVE-2025-34028 still works against it. 🤦♂️

    Commvault claims that 11.38.20 and 11.38.25 fixes the watchTowr-reported CVE-2025-34028 vulnerability. (Aside: How is it even possible that two different versions in the same product line are the ones that fix a single vulnerability?) watchTowr discovered the bug in 11.38.20.

    I trust watchTowr, so I don't believe Commvault's statement that 11.38.20 fixes the vulnerability that watchTowr found in 11.38.20.

    I also trust the PoC that I just ran against 11.38.25, so I don't believe Commvault's statement that 11.38.25 fixes the vulnerability that watchTowr found in 11.38.20.

    Yes, I have trust issues. 😕

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/901/003/124/252/original/4d7dcf947b77b06c.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/903/072/597/218/original/bc949823bc70c827.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/905/102/553/591/original/8249341a63d86457.png
  11. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Will Dormann Will Dormann
    in reply to

    After successfully touching grass and beginning to write up CVE-2025-34028...

    CVE-2025-34028 is a path traversal vulnerability. And yes, the path traversal allows for an unauthenticated attacker to plant files in arbitrary locations. And presumably Commvault has fixed the path traversal part.

    BUT, what about the fact that deployCCPackage() is reachable by design (by way of deployServiceCommcell.do being explicitly listed in authSkipRules.xml)?

    Directory traversal aside, in what world does the ability for an unauthenticated client to deploy a Command Center package make sense, whatever that means? 🤔

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


  12. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
    in reply to

    Ok, after a lenghthy call with Commvault:

    The 11.38 version of Commvault is what's referred to as the "Innovation Release" of the software, where the expectation is that "Pioneer customers" register with Commvault and are specifically approved to even see updates that are available.

    The problem with this:
    Customers who fire up a Commvault 11.38 VM through Azure or the like did not to through the front door of registering with Commvault. As such, they would NOT SEE UPDATES AVAILABLE. This was... not ideal.

    However, based on what the Commvault engineers did on the call that just ended a few minutes ago, they just have changed the backend to provide the "Additional updates" that fix CVE-2025-34028 to weirdos who use Azure such as myself.

    That is, as of about 10 minutes ago, all Commvault 11.38 users can get the fix for CVE-2025-34028 by:

    1. In Manage -> System -> Maintenance, click Download or copy software
    2. Click the Download button (and Next and Run)
    3. In Manage -> Servers, click the ⋮ under Actions and click Upgrade software
    4. Watch the software update.
    5. In Manage -> Servers, click the and click the number next toAdditional updates`
    6. Confirm that you have SP38-CU20-433 and SP38-CU20-436 (if you're runing 11.38.20) or SP38-CU25-434 and SP38-CU25-438 (if you're running 11.38.25).

    NOTE: With the "Innovation Release" (11.38) version of Commvault, the build number does NOT change with the installation of additional updates. That is, 11.38.25 is both vulnerable and not vulnerable to CVE-2025-34028, depending on whether the relevant Additional updates are installed.

    You're all welcome. 😂

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      update.in - このウェブサイトは販売用です! - web statistics リソースおよび情報
      このウェブサイトは販売用です! update.in は、あなたがお探しの情報の全ての最新かつ最適なソースです。一般トピックからここから検索できる内容は、update.inが全てとなります。あなたがお探しの内容が見つかることを願っています!

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/075/556/209/470/original/61c4f9574f0a8b7f.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/076/315/119/898/original/6e62a1374577e0e1.png

    4. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/076/819/936/801/original/90666f2b12463223.png

    5. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/077/442/252/044/original/144fd7f313ddbb0d.png
  13. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
    in reply to

    I'll admit that even with the updated explicit instructions on how to get Commvault updates, I fail to see how one can get these mythical SP38-CU25-434 and SP38-CU25-438 optional updates.

    When I first go to "Download or copy software", Commvault tells me that I'm Up-to-date

    If I manually force a download of Latest Fixes for Current Release: 11.38.25, I get an installer that specifies:

    [Image Information]
    Version=11.80.380.0
    ServicePack=38
    SPTranID=6988515
    UnixTime=1732240991
    RevisionNumber=1352
    Tip=1
    ReducedMedia=1

    And if I run this installer and even reboot for good measure, the system is still vulnerable. And the jar that contains the vulnerable code, cv-ac-common.jar has not changed from my original 11.38.25 vulnerable system.

    I'm not particularly good with computers, so hopefully Commvault sysadmins in the real world are better at this than I am. But I'll admit that even with explicit instructions, I have no idea how to get the updates that protect me against CVE-2025-34028.🤷♂️

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/625/502/384/086/original/45466ea5816f3fef.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/626/098/201/251/original/1e08cf8bfc350eb5.png
  14. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
    in reply to

    Oh, wow.

    Only after pestering the Commvault PSIRT did they update the language of their advisory.

    While it still incorrectly says that 11.38.0 - 11.38.19 are affected and that 11.38.20 is resolved (it is not), the've added a section below this misinformation to convey the actual state of the world:

    11.38.20 is only patched if it has the SP38-CU20-433 and SP38-CU20-436 additional updates installed.

    And 11.38.25 is only patched if it has the SP38-CU25-434 and SP38-CU25-438 additional updates installed.

    I cannot think of a behavior that is more vindictive to their customers to botch language in an advisory so bad, and also to not bother bumping release versions for the fixes for a CVSS 10 EITW vulnerability. 🤦♂️

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/450/506/092/601/original/f3c0de7a8753837f.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/451/116/329/288/original/814b4ab3c55bf412.png
  15. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:42 JST Will Dormann Will Dormann
    in reply to

    If we compare pre-patch and post-patch versions of Commvault, we can see that the fix for CVE-2025-34028 is that the endpoints of webpackage.do, deployWebpackage.do, and deployServiceCommcell.do are no longer exempt from authentication. And while they were at it, they removed the web endpoints altogether.

    So yeah, while the CVE entry for CVE-2025-34028 indicates that the vulnerability is a directory traversal, the real vulnerability is (IMO) that an unauthenticated user can install packages on a Commvault server.

    Sure, the directory traversal makes the impact bad. But the underlying problem is that the endpoint can be reached by unauthenticated users. And that's what was corrected with the updates.

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments



    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/688/825/182/229/original/99c3520d4614d87f.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/693/892/317/739/original/6da412ea449794c0.png



  16. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Saturday, 03-May-2025 21:27:21 JST Will Dormann Will Dormann
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc
    If you find one that works, test posting an animated GIF.
    Last one I tried failed to retain animation because BlueSky is weird in that it requires that you post GIFs as videos instead of images.
    This is the point that I lost interest in cross posting. 😂

    In conversation about 14 days ago from infosec.exchange permalink
  17. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 01-May-2025 23:36:48 JST Will Dormann Will Dormann
    in reply to
    • Kevin Beaumont
    • Taggart :donor:

    @GossiTheDog @mttaggart
    Not sure what you mean...
    My hotmail account is passwordless? (Locally it uses a PIN)

    Unless you're talking about something else?

    In conversation about 16 days ago from gnusocial.jp permalink
  18. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 01-May-2025 21:32:25 JST Will Dormann Will Dormann
    in reply to
    • Kevin Beaumont
    • Taggart :donor:

    @mttaggart @GossiTheDog
    In my case:
    Windows 11 Enterprise with a local account initially (via BYPASSNRO)
    I added a Microsoft (hotmail.com) account.
    I then turned on RDP.
    That's all. Absolutely nothing else.

    If I log in via that hotmail account to RDP, it will accept the original cached password even if I change my hotmail account password.

    In conversation about 16 days ago from gnusocial.jp permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: ow2.res.office365.com
      Outlook – free personal email and calendar from Microsoft
      from Microsoft
      Get free Outlook email and calendar, plus Office Online apps like Word, Excel and PowerPoint. Sign in to access your Outlook, Hotmail or Live email account.

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/429/420/945/735/068/original/f090a15060e8ba01.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/429/422/475/304/248/original/6caffd399e4feb41.png
  19. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 01-May-2025 21:32:25 JST Will Dormann Will Dormann
    in reply to
    • Kevin Beaumont
    • Taggart :donor:

    @mttaggart @GossiTheDog
    Hm, that all sounds different than what I tested.

    In conversation about 16 days ago from gnusocial.jp permalink
  20. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 01-May-2025 21:31:57 JST Will Dormann Will Dormann
    • Kevin Beaumont
    • Taggart :donor:

    @GossiTheDog @mttaggart
    Yeah, I didn't have a local AD ready to test.
    But I could definitely see a difference with authenticating RDP using a local account vs. an online account.
    With local accounts, the instant the password changes, the RDP client needs the new password.
    For online accounts, the old password still works, indefinitely.

    In conversation about 16 days ago from gnusocial.jp permalink
  • Before

User actions

    Will Dormann

    Will Dormann

    I play with vulnerabilities and exploits.I used to be https://twitter.com/wdormann but Twitter has become unbearable, so here I am.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          232810
          Member since
          16 Jan 2024
          Notices
          134
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.