Ngo Wei Lin Profile
Ngo Wei Lin

@Creastery

Followers
1K
Following
2K
Media
5
Statuses
115

www = web web web · Staff Security Engineer @praetorianlabs · Previously 🌐 Security Researcher @starlabs_sg · Plays CTFs with HATS SG. Opinions are my own.

Singapore
Joined May 2012
Don't wanna be here? Send us removal request.
@Creastery
Ngo Wei Lin
2 years
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
Tweet card summary image
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
@Creastery
Ngo Wei Lin
8 months
Happy to announce that I'll be speaking alongside @DennisPacewicz at @rubykaigi next week! We'll be sharing some secret stories on how I gained access to production GitHub credentials using CVE-2024-0200 as well as @GitHubSecurity's remediation efforts. https://t.co/zIHyfJ7vqZ
Tweet card summary image
rubykaigi.org
1
1
6
@lukejahnke
Luke Jahnke
1 year
I just published a new blog post sharing an improved Deserialization Gadget Chain for Ruby! It builds on the work of others, including Leonardo Giovanni, Peter Stöckli @GHSecurityLab and @wcbowling https://t.co/mzXQnA691O
2
63
208
@orange_8361
Orange Tsai 🍊
1 year
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
652
2K
@GHSecurityLab
GitHub Security Lab
1 year
🚨 New Blog Alert! 🚨 Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities in Ruby can be exploited and how they can be detected with CodeQL. 🔗 Read the full post: https://t.co/tdumVwrfKC Stay safe and code responsibly! 🛡️💻
Tweet card summary image
github.blog
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog...
0
20
46
@infosec_au
shubs
2 years
My colleague @hash_kitten and I discovered a full-read SSRF vulnerability in Next.js (CVE-2024-34351). We published our research today on @assetnote's blog: https://t.co/pUXGG64B0O. Thank you to the Vercel team for a smooth disclosure process.
17
183
786
@adnanthekhan
Adnan Khan
2 years
Here is my deep-dive post on #github Actions cache poisoning. This is a powerful build pipeline lateral movement and privilege escalation technique and I used it to earn several thousand💰in #bugbounty rewards. https://t.co/7S5MjdP2Wc
Tweet card summary image
adnanthekhan.com
Introduction UPDATE 01/23/25 - Some of the techniques in this blog post no longer apply, however the core technique is still valid: Cache poisoning allows workflow lateral movement. The big change is...
3
25
89
@starlabs_sg
starlabs
2 years
Send()-ing Myself Belated Christmas Gifts - GitHub's Environment Variables & GHES Shell https://t.co/g9d3kOA04o Read about how one of our talented researchers, @Creastery , found it, exploited it and reported it in a fast and professional manner:
Tweet card summary image
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
1
20
102
@Creastery
Ngo Wei Lin
2 years
Huge thanks to @GitHubSecurity for coordinating, investigating and fixing!
0
0
6
@joernchen
joernchen
2 years
Earlier this year I found a pretty cool vuln, an arbitrary file write in GitLab. Here’s the details
5
48
155
@starlabs_sg
starlabs
2 years
Route to Safety: Navigating Router Pitfalls is the swansong from @daniellimws https://t.co/QOqAkOhHMz We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
Tweet card summary image
starlabs.sg
Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s internal network or sensitive data. Additionally, there has...
2
29
61
@offbyoneconf
Off-By-One Conference
2 years
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits https://t.co/96khe0PVR2 If you like to talk to us, drop us a line at info@offbyone.sg
0
18
33
@Creastery
Ngo Wei Lin
2 years
👀
@CVEnew
CVE
2 years
CVE-2024-0200 An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of…
1
0
11
@Creastery
Ngo Wei Lin
2 years
This is one of the most insane bugs I've discovered, but it all happened at a really inopportune time. 😥 Shoutout to all the Hubbers who got involved and had been working tirelessly on this since the Christmas/New Year period! 🙏
@GitHubSecurity
GitHub Security
2 years
We received a bug bounty report of a vulnerability which, if exploited, allowed access to credentials within a production container. We have patched https://t.co/0iKPk2jtk4 and rotated all affected credentials, and patches for GHES are available today.
0
0
57
@Creastery
Ngo Wei Lin
2 years
Notably, CVE-2023-3368 I discovered is a patch bypass of CVE-2023-34960 (unauthenticated command injection bug exploited in-the-wild found by @RandoriSec/@Aituglo), and CVE-2023-3533 is another unauthenticated file write RCE found in the same code location that was overlooked!🙈
0
0
3
@Creastery
Ngo Wei Lin
2 years
Check out the technical analysis of 10 remote code execution bugs I discovered in Chamilo LMS below⬇️.
2
1
15
@Creastery
Ngo Wei Lin
2 years
Check out this detailed n-day writeup by @oceankex, a former web security intern at STAR Labs I mentored, and how it led to two other bugs hidden in plain sight being discovered!
@starlabs_sg
starlabs
2 years
Our team member, @Creastery , & our former intern, @oceankex, prepared this some time ago. "Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)" https://t.co/XEEzSmFANT While writing this, they found another bug https://t.co/bUK1KEJNqh We hope you enjoy it
1
0
7
@Chocologicall
Jia Hao
2 years
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️‍♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
Tweet card summary image
starlabs.sg
Summary: Product Trend Micro Apex Central 2019 Vendor Trend Micro Severity High Affected Versions Apex Central 2019 Build <= 6016 Tested Version(s) Apex Central 2019 Build 6016 CVE Identifier...
0
41
165