CVE ID: CVE-2024-58136
Vendor: Yiiframework
Product: Yii
Date Added: 2025-05-02
Vulnerability: Yiiframework Yii Improper Protection of Alternate Path Vulnerability
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-58136
Making Burp Suite snappy on Asahi Linux β https://dustri.org/b/making-burp-suite-snappy-on-asahi-linux.html
watchTowr labs published a good write-up on the EITW vulns in the SonicWALL SMA100 ( CVE-2024-38475 and CVE-2023-44221 ).
From iframes and file reads to full RCE. π₯
We found an HTML-to-PDF API allowing file reads and SSRF - then chained it into remote code execution via a Chromium 62 WebView exploit.
π Read the full write-up here: https://neodyme.io/en/blog/html_renderer_to_rce/
AFL++ v4.32c release - mostly minor bug fixes and improvements, LLVM 20 users should update! https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.32c #afl #fuzzing #fuzzing-tools #fuzzingtools
Interesting Git repos of the week:
Strategy:
* https://github.com/TalEliyahu/awesome-CISO-maturity-models - modelling your strategy
Detection:
* https://github.com/yevh/TaaC-AI - threat modelling as code
* https://github.com/thalesgroup-cert/Watcher - build your own threat hunting platform with Thales
* https://github.com/microsoft/msticpy - Microsoft's TI tooling
Exploitation:
* https://github.com/specfy/stack-analyser - what's in the stack?
Hardening:
* https://github.com/nistorj/ISR1000 - guestshell on the ISR1000
Donβt forget to patch your #forgejo tomorrow! (Security related)
https://floss.social/@forgejo/114433179035067022
I'm proud to announce that myself and @atipriyabajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. https://sure-workshop.org/
Please follow our workshop account @sureworkshop and RT it for visibility :).
Here's something counterintuitive to non-practitioners: curve P-521 is often less secure in practice than curve P-256.
The latter is more popular, and so better tested. The risk of implementation bugs dwarfs the risk of partial cryptanalysis of ECC, so picking P-521 optimizes for the wrong thing.
Intel's 386 processor (1985) moved the x86 architecture to 32 bits, but it needed to be backward compatible with earlier 16 and 8-bit processors. As a result, it needed complicated circuitry for its internal registers: six different circuits for 30 registers. Let's look at the silicon circuits. 1/N