<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>pspaul&#39;s blog</title>
  
  <subtitle>CTFs + WebSec</subtitle>
  <link href="https://blog.pspaul.de/atom.xml" rel="self"/>
  
  <link href="https://blog.pspaul.de/"/>
  <updated>2025-12-11T10:20:00.000Z</updated>
  <id>https://blog.pspaul.de/</id>
  
  <author>
    <name>pspaul</name>
    
  </author>
  
  <generator uri="https://hexo.io/">Hexo</generator>
  
  <entry>
    <title>ZeroDay Cloud 2025: Post-Auth RCE in PostgreSQL</title>
    <link href="https://x.com/wiz_io/status/1999487646117298407"/>
    <id>https://x.com/wiz_io/status/1999487646117298407</id>
    <published>2025-12-11T10:20:00.000Z</published>
    <updated>2025-12-11T10:20:00.000Z</updated>
    
    
    
    
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="zeroday cloud" scheme="https://blog.pspaul.de/tags/zeroday-cloud/"/>
    
    <category term="postgresql" scheme="https://blog.pspaul.de/tags/postgresql/"/>
    
  </entry>
  
  <entry>
    <title>ZeroDay Cloud 2025: Post-Auth RCE in Grafana</title>
    <link href="https://x.com/wiz_io/status/1999487646117298407"/>
    <id>https://x.com/wiz_io/status/1999487646117298407</id>
    <published>2025-12-10T12:30:00.000Z</published>
    <updated>2025-12-10T12:30:00.000Z</updated>
    
    
    
    
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="zeroday cloud" scheme="https://blog.pspaul.de/tags/zeroday-cloud/"/>
    
    <category term="grafana" scheme="https://blog.pspaul.de/tags/grafana/"/>
    
  </entry>
  
  <entry>
    <title>Zombie Workflows: A GitHub Actions Horror Story</title>
    <link href="https://www.sonarsource.com/blog/zombie-workflows-a-github-actions-horror-story/"/>
    <id>https://www.sonarsource.com/blog/zombie-workflows-a-github-actions-horror-story/</id>
    <published>2025-12-09T16:00:00.000Z</published>
    <updated>2025-12-09T16:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="github actions" scheme="https://blog.pspaul.de/tags/github-actions/"/>
    
    <category term="ci/cd" scheme="https://blog.pspaul.de/tags/ci-cd/"/>
    
  </entry>
  
  <entry>
    <title>Ollama Remote Code Execution: Securing the Code That Runs LLMs</title>
    <link href="https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/"/>
    <id>https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/</id>
    <published>2025-11-04T16:00:00.000Z</published>
    <updated>2025-11-04T16:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="ai" scheme="https://blog.pspaul.de/tags/ai/"/>
    
    <category term="ollama" scheme="https://blog.pspaul.de/tags/ollama/"/>
    
  </entry>
  
  <entry>
    <title>Hack.lu 2025: Lethal Language Models: From Bit Flip To RCE In Ollama</title>
    <link href="https://www.youtube.com/watch?v=YjCHGWIGxbU"/>
    <id>https://www.youtube.com/watch?v=YjCHGWIGxbU</id>
    <published>2025-10-24T09:15:00.000Z</published>
    <updated>2025-10-24T09:15:00.000Z</updated>
    
    
    
    
    
    <category term="hack.lu" scheme="https://blog.pspaul.de/tags/hack-lu/"/>
    
    <category term="pwn" scheme="https://blog.pspaul.de/tags/pwn/"/>
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="talk" scheme="https://blog.pspaul.de/tags/talk/"/>
    
  </entry>
  
  <entry>
    <title>Code Security for Conversational AI: Uncovering a Zip Slip in EDDI</title>
    <link href="https://www.sonarsource.com/blog/code-security-for-conversational-ai-uncovering-a-zip-slip-in-eddi/"/>
    <id>https://www.sonarsource.com/blog/code-security-for-conversational-ai-uncovering-a-zip-slip-in-eddi/</id>
    <published>2025-09-16T15:00:00.000Z</published>
    <updated>2025-09-16T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="ctf" scheme="https://blog.pspaul.de/tags/ctf/"/>
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
  </entry>
  
  <entry>
    <title>Securing Kotlin Apps With SonarQube: Real-World Examples</title>
    <link href="https://www.sonarsource.com/blog/securing-kotlin-apps-with-sonarqube-real-world-examples/"/>
    <id>https://www.sonarsource.com/blog/securing-kotlin-apps-with-sonarqube-real-world-examples/</id>
    <published>2025-07-15T15:00:00.000Z</published>
    <updated>2025-07-15T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
  </entry>
  
  <entry>
    <title>TROOPERS25: Scriptless Attacks: Why CSS is My Favorite Programming Language</title>
    <link href="https://troopers.de/troopers25/talks/qga8hg/"/>
    <id>https://troopers.de/troopers25/talks/qga8hg/</id>
    <published>2025-06-25T12:15:00.000Z</published>
    <updated>2025-06-25T12:15:00.000Z</updated>
    
    
    
    
    
    <category term="css" scheme="https://blog.pspaul.de/tags/css/"/>
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="talk" scheme="https://blog.pspaul.de/tags/talk/"/>
    
    <category term="troopers" scheme="https://blog.pspaul.de/tags/troopers/"/>
    
  </entry>
  
  <entry>
    <title>Double Dash, Double Trouble: A Subtle SQL Injection Flaw</title>
    <link href="https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/"/>
    <id>https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/</id>
    <published>2025-06-10T15:00:00.000Z</published>
    <updated>2025-06-10T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
  </entry>
  
  <entry>
    <title>Data in Danger: Detecting Cross-Site Scripting in Grafana</title>
    <link href="https://www.sonarsource.com/blog/data-in-danger-detecting-xss-in-grafana-cve-2025-2703/"/>
    <id>https://www.sonarsource.com/blog/data-in-danger-detecting-xss-in-grafana-cve-2025-2703/</id>
    <published>2025-04-24T15:00:00.000Z</published>
    <updated>2025-04-24T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
  </entry>
  
  <entry>
    <title>Beware the Cookie Monster: Cyberhaven Extension Vulnerability Allowed Cookie Theft</title>
    <link href="https://www.sonarsource.com/blog/beware-the-cookie-monster-cyberhaven-extension-vulnerability-allowed-cookie-theft/"/>
    <id>https://www.sonarsource.com/blog/beware-the-cookie-monster-cyberhaven-extension-vulnerability-allowed-cookie-theft/</id>
    <published>2025-02-26T16:00:00.000Z</published>
    <updated>2025-02-26T16:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
  </entry>
  
  <entry>
    <title>GymTok: Breaking TLS Using the Alt-Svc Header</title>
    <link href="https://blog.pspaul.de/posts/gymtok-breaking-tls-with-alt-svc/"/>
    <id>https://blog.pspaul.de/posts/gymtok-breaking-tls-with-alt-svc/</id>
    <published>2025-02-18T23:00:00.000Z</published>
    <updated>2025-02-18T23:00:00.000Z</updated>
    
    
    <summary type="html">Ever wondered what the Alt-Svc response header is used for? Turns out it can be used to become a Man-in-the-Middle and attack TLS!</summary>
    
    
    
    
    <category term="ctf" scheme="https://blog.pspaul.de/tags/ctf/"/>
    
    <category term="writeup" scheme="https://blog.pspaul.de/tags/writeup/"/>
    
    <category term="alt-svc" scheme="https://blog.pspaul.de/tags/alt-svc/"/>
    
    <category term="tls" scheme="https://blog.pspaul.de/tags/tls/"/>
    
    <category term="mitm" scheme="https://blog.pspaul.de/tags/mitm/"/>
    
    <category term="firefox" scheme="https://blog.pspaul.de/tags/firefox/"/>
    
  </entry>
  
  <entry>
    <title>Ancient Monkey: Pwning a 17-Year-Old Version of SpiderMonkey</title>
    <link href="https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/"/>
    <id>https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/</id>
    <published>2024-10-28T19:50:36.000Z</published>
    <updated>2024-10-28T19:50:36.000Z</updated>
    
    
    <summary type="html">Last year, @swapgs and I found a fun bug in the popular enterprise VPN solution Zscaler. The VPN client used the pacparser library to decide which HTTP requests to proxied based on a PAC file.</summary>
    
    
    
    
    <category term="ctf" scheme="https://blog.pspaul.de/tags/ctf/"/>
    
    <category term="hack.lu" scheme="https://blog.pspaul.de/tags/hack-lu/"/>
    
    <category term="spidermonkey" scheme="https://blog.pspaul.de/tags/spidermonkey/"/>
    
    <category term="js" scheme="https://blog.pspaul.de/tags/js/"/>
    
    <category term="pwn" scheme="https://blog.pspaul.de/tags/pwn/"/>
    
  </entry>
  
  <entry>
    <title>Hack.lu 2024: SQL Injection Isn&#39;t Dead: Smuggling Queries At The Protocol Level</title>
    <link href="https://www.youtube.com/watch?v=N1FAOb1krBk"/>
    <id>https://www.youtube.com/watch?v=N1FAOb1krBk</id>
    <published>2024-10-24T13:30:00.000Z</published>
    <updated>2024-10-24T13:30:00.000Z</updated>
    
    
    <summary type="html">SQL injections seem to be a solved problem; databases have built-in support for prepared statements, leaving no room for injections. In this session, we will go a level deeper: instead of attacking the query syntax, we will explore smuggling attacks against database wire protocols, through which remote, unauthenticated attackers can inject entire (No)SQL statements into an application&#39;s database connection.</summary>
    
    
    
    
    <category term="hack.lu" scheme="https://blog.pspaul.de/tags/hack-lu/"/>
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="talk" scheme="https://blog.pspaul.de/tags/talk/"/>
    
    <category term="sql injection" scheme="https://blog.pspaul.de/tags/sql-injection/"/>
    
  </entry>
  
  <entry>
    <title>Bench Press: Leaking Text Nodes with CSS</title>
    <link href="https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/"/>
    <id>https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/</id>
    <published>2024-10-20T18:00:00.000Z</published>
    <updated>2024-10-20T18:00:00.000Z</updated>
    
    
    <summary type="html">Some time ago, while reading up on new CSS features, I asked myself: Is it  possible to leak the entire content of an HTML text node only using CSS?</summary>
    
    
    
    
    <category term="ctf" scheme="https://blog.pspaul.de/tags/ctf/"/>
    
    <category term="writeup" scheme="https://blog.pspaul.de/tags/writeup/"/>
    
    <category term="css" scheme="https://blog.pspaul.de/tags/css/"/>
    
    <category term="css injection" scheme="https://blog.pspaul.de/tags/css-injection/"/>
    
    <category term="csp" scheme="https://blog.pspaul.de/tags/csp/"/>
    
  </entry>
  
  <entry>
    <title>DEF CON 32: SQL Injection Isn&#39;t Dead: Smuggling Queries At The Protocol Level</title>
    <link href="https://www.youtube.com/watch?v=Tfg1B8u1yvE"/>
    <id>https://www.youtube.com/watch?v=Tfg1B8u1yvE</id>
    <published>2024-08-10T12:00:00.000Z</published>
    <updated>2024-08-10T12:00:00.000Z</updated>
    
    
    <summary type="html">SQL injections seem to be a solved problem; databases have built-in support for prepared statements, leaving no room for injections. In this session, we will go a level deeper: instead of attacking the query syntax, we will explore smuggling attacks against database wire protocols, through which remote, unauthenticated attackers can inject entire (No)SQL statements into an application&#39;s database connection.</summary>
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="talk" scheme="https://blog.pspaul.de/tags/talk/"/>
    
    <category term="def con" scheme="https://blog.pspaul.de/tags/def-con/"/>
    
    <category term="sql injection" scheme="https://blog.pspaul.de/tags/sql-injection/"/>
    
  </entry>
  
  <entry>
    <title>Gogs: RCE via Git-Related Bugs (2/2)</title>
    <link href="https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-2/"/>
    <id>https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-2/</id>
    <published>2024-07-09T15:00:00.000Z</published>
    <updated>2024-07-09T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="argument injection" scheme="https://blog.pspaul.de/tags/argument-injection/"/>
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="git" scheme="https://blog.pspaul.de/tags/git/"/>
    
    <category term="gogs" scheme="https://blog.pspaul.de/tags/gogs/"/>
    
  </entry>
  
  <entry>
    <title>Gogs: RCE via Argument Injection in the SSH Server (1/2)</title>
    <link href="https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/"/>
    <id>https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/</id>
    <published>2024-07-02T15:00:00.000Z</published>
    <updated>2024-07-02T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="argument injection" scheme="https://blog.pspaul.de/tags/argument-injection/"/>
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="gogs" scheme="https://blog.pspaul.de/tags/gogs/"/>
    
    <category term="ssh" scheme="https://blog.pspaul.de/tags/ssh/"/>
    
  </entry>
  
  <entry>
    <title>justCTF 2024 Teaser: Casino (Web 394)</title>
    <link href="https://blog.pspaul.de/posts/justctf-2024-teaser-casino/"/>
    <id>https://blog.pspaul.de/posts/justctf-2024-teaser-casino/</id>
    <published>2024-06-19T00:08:00.000Z</published>
    <updated>2024-06-19T00:08:00.000Z</updated>
    
    
      
      
    <summary type="html">
        &lt;div class=&quot;challenge&quot;&gt;
            &lt;div class=&quot;challenge-header&quot;&gt;
                &lt;div&gt;
                    &lt;div&gt;
                </summary>
      
    
    
    
    
    <category term="ctf" scheme="https://blog.pspaul.de/tags/ctf/"/>
    
    <category term="writeup" scheme="https://blog.pspaul.de/tags/writeup/"/>
    
    <category term="js" scheme="https://blog.pspaul.de/tags/js/"/>
    
    <category term="justCTF" scheme="https://blog.pspaul.de/tags/justctf/"/>
    
    <category term="rng" scheme="https://blog.pspaul.de/tags/rng/"/>
    
  </entry>
  
  <entry>
    <title>Re-moo-te Code Execution in Mailcow: Always Sanitize Error Messages</title>
    <link href="https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages/"/>
    <id>https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages/</id>
    <published>2024-06-17T15:00:00.000Z</published>
    <updated>2024-06-17T15:00:00.000Z</updated>
    
    
    
    
    
    <category term="sonar" scheme="https://blog.pspaul.de/tags/sonar/"/>
    
    <category term="xss" scheme="https://blog.pspaul.de/tags/xss/"/>
    
    <category term="rce" scheme="https://blog.pspaul.de/tags/rce/"/>
    
    <category term="mailcow" scheme="https://blog.pspaul.de/tags/mailcow/"/>
    
    <category term="php" scheme="https://blog.pspaul.de/tags/php/"/>
    
  </entry>
  
</feed>
