🧟 A fixed vulnerability that comes back to life?
This could have happened in GitHub Actions until yesterday! Learn how attackers could have exploited seemingly fixed workflow vulnerabilities:
www.sonarsource.com/blog/zombie-...
#appsec #security #vulnerability
09.12.2025 18:59
👍 1
🔁 1
💬 0
📌 0
TROOPERS25: Scriptless Attacks - Why CSS is My Favorite Programming Language
YouTube video by TROOPERS IT Security Conference
My TROOPERS25 talk has been uploaded! If you ever wondered if "style-src: 'unsafe-line'" in your CSP is bad, this one is for you.
Scriptless Attacks: Why CSS is My Favorite Programming Language
www.youtube.com/watch?v=Owp-...
02.12.2025 09:51
👍 0
🔁 0
💬 0
📌 0
This was pretty fun to exploit! Even though I didn't manage to pwn the version used for Pwn2Own Berlin, I still learned a ton about LLMs. Maybe I can get my revenge in future competitions 🤞
04.11.2025 17:45
👍 5
🔁 1
💬 0
📌 0
Using SonarQube to solve a CTF challenge? Done! ✅
Learn how we detected a 0-day vulnerability during #KalmarCTF, making us first to solve the challenge! From Zip Slip to RCE, using lazy class loading:
www.sonarsource.com/blog/code-se...
#appsec #CTF #vulnerability
16.09.2025 15:38
👍 3
🔁 1
💬 0
📌 0
Great bug chain by my team mate Yaniv that can pwn a whole org, starting with a single user click! I was also able to contribute a bit by creating my first port of a Chrome n-day exploit :)
26.06.2025 14:48
👍 0
🔁 0
💬 0
📌 0
Catch our second talk at #TROOPERS25:
🕸️ Caught in the FortiNet: Compromising Organizations Using Endpoint Protection
Yaniv Nizry will tell you the story of multiple vulnerabilities in Fortinet products that can compromise an entire organization, starting with a single click
24.06.2025 08:31
👍 4
🔁 1
💬 0
📌 0
Title: Scriptless Attacks: Why CSS is My Favorite Programming Language
Speaker: Paul Gerste, Vulnerability Researcher, Sonar
Date: Wednesday, June 25, 2025
Time: 2:15 pm
Location: Track 3
Coming to #TROOPERS25 this week? We'll be there too, presenting our research!
🎨 Scriptless Attacks: Why CSS is My Favorite Programming Language
@pspaul95.bsky.social will convince you why CSS should not be overlooked in client-side web attacks and what is possible without JavaScript today
23.06.2025 10:57
👍 4
🔁 2
💬 0
📌 0
This was a fun one to discover!
SQL syntax can be ambiguous, and MySQL anticipated this a long time ago. Other SQL dialects stuck to the spec, leading to SQL injection when the right stars align:
10.06.2025 15:50
👍 1
🔁 0
💬 0
📌 0
my dream browser vuln is one entirely exploitable from CSS, no JS involved. not sure how feasible that really is tho, even with all the modern conditional CSS tricks
01.05.2025 17:00
👍 2
🔁 0
💬 1
📌 0
Browser compatibility
There is no browser implementing this feature.
"wow, this css property would be amazing for my css crime, i wonder what the browser support is looking like"
27.03.2025 11:14
👍 42
🔁 4
💬 1
📌 0
GymTok: Breaking TLS Using the Alt-Svc Header
Ever wondered what the Alt-Svc response header is used for? Turns out it can be used to become a Man-in-the-Middle and attack TLS!
Ever wondered what the Alt-Svc header is used for? Well, it can make you a MitM if you control it!
I can finally publish the writeup to my GymTok challenge: control the header, become MitM, and perform a cross-protocol attack!
blog.pspaul.de/posts/gymtok...
19.02.2025 16:10
👍 2
🔁 2
💬 0
📌 0
Wow, thanks for 2nd place! Didn't expect this, maybe it's my sign to finally write it down in text form and tackle all the follow-up ideas 👀
06.02.2025 09:18
👍 8
🔁 1
💬 1
📌 0