Check out our Chrome Extension challenge, "moa-station", at ctf.bsidessf.net.
Check out our Chrome Extension challenge, "moa-station", at ctf.bsidessf.net.
Join us at ctf.bsidessf.net/register, the #BSidesSF #CTF kicks off at 4:00pm PDT tomorrow!
Join us at ctf.bsidessf.net/register, the #BSidesSF #CTF kicks off at 4:00pm PDT tomorrow!
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
Looks like this got caught by chance. Wonder how long it would have taken otherwise.
www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.