Jia Hao
@Chocologicall
Followers
512
Following
998
Media
1
Statuses
749
Patience is a virtue. Every puzzle has an answer. | Opinions expressed are of my own.
Joined July 2012
As promised, we are releasing the source code & writeup for the #OffByOneConf badge 1 month after the event, allowing interested participants the opportunity to explore it. Thanks largely to Manzel, other team members & interns who help to make it happen. https://t.co/t6HUrOa5Ay
starlabs.sg
Introduction As promised, we are releasing the firmware and this post for the Off-By-One badge about one month after the event, allowing interested participants the opportunity to explore it. If...
0
19
56
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
Route to Safety: Navigating Router Pitfalls is the swansong from @daniellimws
https://t.co/QOqAkOhHMz We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
starlabs.sg
Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s internal network or sensitive data. Additionally, there has...
2
29
61
We are organising a conference on 26th - 27th June 2024 Attention Speakers: Our 2024 Call for Papers is now open! #OffByOne2024? Learn all about it: https://t.co/hsUZ23yYVw
2
22
62
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits https://t.co/96khe0PVR2 If you like to talk to us, drop us a line at info@offbyone.sg
0
18
33
Great to see that some of the bugs that we reported to ICS vendors had been fixed. Thanks to @Peterpan980927 & @CurseRed for CVE-2023-6358 https://t.co/UXcdapQgrR And @testanull for CVE-2023-39474 https://t.co/WHEQ4gjQjL More to come soon.
industrial.softing.com
1
7
31
Several Chamilo RCE detailed analysis from our team member, @Creastery Patches available since September 2023. https://t.co/LQOOByHwUo
https://t.co/EDYbywRxT7
https://t.co/AhOzVsQ5VP
https://t.co/kKKlBGH78Q
https://t.co/9k6lvCbtuZ
https://t.co/tvoyhKqVkF
starlabs.sg
Summary Product Chamilo Vendor Chamilo Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution. Affected Versions <= v1.11.24 Tested Versions...
0
13
66
Our team members have spotted another fake account imposing as our team member. This is the fake account: https://t.co/djZSgc7SeE This one belongs to our team member. https://t.co/6UeyOfZuCe
1
7
14
Our team member, @Chocologicall , found 2 vulnerabilities in Dolibarr ERP CRM Please read the security details in the technical advisories here: https://t.co/hVfegknVgm
https://t.co/Du541us6vg CVE-2023-4197 & CVE-2023-4198
starlabs.sg
Summary: Product Dolibarr ERP CRM Vendor Dolibarr Severity High Affected Versions <= 17.0.3 Tested Versions 17.0.1, 17.0.3 CVE Identifier CVE-2023-4198 CVE Description Improper Access Control in...
0
5
31
Awesome work by our team members @testanull @hi_im_d4rkn3ss @linhlhq @tuanit96 & @st424204 for their successful entries https://t.co/TjzpIApRZR
https://t.co/er1h4sTAv1 Not forgetting the rest of our team members who attempted to find bugs for P2O amid a hectic schedule
Success! STAR Labs SG was able to execute a 2-bug chain including directory traversal and command injection against the QNAP TS-464. They earn $20,000 and 4 Master of Pwn points. #Pwn2Own
1
8
55
Our team member, @Creastery , & our former intern, @oceankex, prepared this some time ago. "Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)" https://t.co/XEEzSmFANT While writing this, they found another bug https://t.co/bUK1KEJNqh We hope you enjoy it
starlabs.sg
Summary: Product NodeBB Vendor NodeBB Severity High - Unprivileged attackers are able to cause NodeBB to crash and exit permanently Affected Versions < v2.8.11 (Commit 82f0efb) Tested Versions v2.8.9...
0
8
52
Do check out this new advisory made public by our team member, @Chocologicall It's CVE-2023-2315, Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2 https://t.co/YbtVdVzi53
starlabs.sg
Summary: Product OpenCart Vendor OpenCart Severity High - Adversaries may exploit software vulnerabilities to empty any file on the server with write permissions. Affected Versions 4.0.0.0 - 4.0.2.2...
0
8
35
Awesome research !! 🤘❤️ This remind me a research that I've done 6 years ago on the Trend Micro product family. I specially focused on these PHP bugs👇 https://t.co/21mPqPRcNS
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
1
2
19
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
starlabs.sg
Summary: Product Trend Micro Apex Central 2019 Vendor Trend Micro Severity High Affected Versions Apex Central 2019 Build <= 6016 Tested Version(s) Apex Central 2019 Build 6016 CVE Identifier...
0
41
165
We have just uploaded the slides by @Chocologicall
https://t.co/igHiI9rVOA and by @CurseRed
https://t.co/6GK4Opcrha Thanks a lot to @HacksInTaiwan for organising a fantastic conference and our team members are truly honored to participate in it.
0
19
50
Excited to share my findings with all :)
Looking forward to the look by our team member @Chocologicall
0
0
5
These bugs are found by our former team member, @PTDuy but it took us a long time/process. We pluck up our courage and ask @minliangtan via FB. Mr Tan replied us instantly & directed us to Razer's security team. We are forever greatly to Mr Tan https://t.co/YX8VUnXuGL
0
12
34