Ngo Wei Lin
@Creastery
Followers
1K
Following
2K
Media
5
Statuses
115
www = web web web · Staff Security Engineer @praetorianlabs · Previously 🌐 Security Researcher @starlabs_sg · Plays CTFs with HATS SG. Opinions are my own.
Singapore
Joined May 2012
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
Happy to announce that I'll be speaking alongside @DennisPacewicz at @rubykaigi next week! We'll be sharing some secret stories on how I gained access to production GitHub credentials using CVE-2024-0200 as well as @GitHubSecurity's remediation efforts. https://t.co/zIHyfJ7vqZ
rubykaigi.org
1
1
6
I just published a new blog post sharing an improved Deserialization Gadget Chain for Ruby! It builds on the work of others, including Leonardo Giovanni, Peter Stöckli @GHSecurityLab and @wcbowling
https://t.co/mzXQnA691O
2
63
208
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
652
2K
🚨 New Blog Alert! 🚨 Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities in Ruby can be exploited and how they can be detected with CodeQL. 🔗 Read the full post: https://t.co/tdumVwrfKC Stay safe and code responsibly! 🛡️💻
github.blog
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog...
0
20
46
My colleague @hash_kitten and I discovered a full-read SSRF vulnerability in Next.js (CVE-2024-34351). We published our research today on @assetnote's blog: https://t.co/pUXGG64B0O. Thank you to the Vercel team for a smooth disclosure process.
17
183
786
Here is my deep-dive post on #github Actions cache poisoning. This is a powerful build pipeline lateral movement and privilege escalation technique and I used it to earn several thousand💰in #bugbounty rewards. https://t.co/7S5MjdP2Wc
adnanthekhan.com
Introduction UPDATE 01/23/25 - Some of the techniques in this blog post no longer apply, however the core technique is still valid: Cache poisoning allows workflow lateral movement. The big change is...
3
25
89
Send()-ing Myself Belated Christmas Gifts - GitHub's Environment Variables & GHES Shell https://t.co/g9d3kOA04o Read about how one of our talented researchers, @Creastery , found it, exploited it and reported it in a fast and professional manner:
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
1
20
102
Huge thanks to @GitHubSecurity for coordinating, investigating and fixing!
0
0
6
Earlier this year I found a pretty cool vuln, an arbitrary file write in GitLab. Here’s the details
5
48
155
Route to Safety: Navigating Router Pitfalls is the swansong from @daniellimws
https://t.co/QOqAkOhHMz We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
starlabs.sg
Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s internal network or sensitive data. Additionally, there has...
2
29
61
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits https://t.co/96khe0PVR2 If you like to talk to us, drop us a line at info@offbyone.sg
0
18
33
This is one of the most insane bugs I've discovered, but it all happened at a really inopportune time. 😥 Shoutout to all the Hubbers who got involved and had been working tirelessly on this since the Christmas/New Year period! 🙏
We received a bug bounty report of a vulnerability which, if exploited, allowed access to credentials within a production container. We have patched https://t.co/0iKPk2jtk4 and rotated all affected credentials, and patches for GHES are available today.
0
0
57
Special thanks to @chudypb, @TecR0c, @mr_me, @Creastery, @starlabs_sg, @Claroty & #team82, and @thezdi for finding & responsibly disclosing security vulnerabilities in Ignition. Fixes & full credits:
support.inductiveautomation.com
Regarding the Security Advisories Published by the ZDI on 8 August 2023 On August 8th, 2023, Trend Micro’s Zero Day Initiative (ZDI), the organizers of ICS Pwn2Own, published six security advisorie...
1
3
11
Notably, CVE-2023-3368 I discovered is a patch bypass of CVE-2023-34960 (unauthenticated command injection bug exploited in-the-wild found by @RandoriSec/@Aituglo), and CVE-2023-3533 is another unauthenticated file write RCE found in the same code location that was overlooked!🙈
0
0
3
Unauthenticated RCE: https://t.co/97Mi49tF89
https://t.co/1O7uldVv72
https://t.co/88MJwszEDT
https://t.co/7mmpILtEJB Authenticated RCE: https://t.co/cxEMOi4br3
https://t.co/PLRLXGOg8X
https://t.co/TSYH5uoTv3
https://t.co/wWPJ8kzeei
https://t.co/GHIfsRqMB7
https://t.co/eqALGosQPC
starlabs.sg
Summary Product Chamilo Vendor Chamilo Severity High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution. Affected Versions <= v1.11.24 Tested Versions...
1
2
4
Check out the technical analysis of 10 remote code execution bugs I discovered in Chamilo LMS below⬇️.
Several Chamilo RCE detailed analysis from our team member, @Creastery Patches available since September 2023. https://t.co/LQOOByHwUo
https://t.co/EDYbywRxT7
https://t.co/AhOzVsQ5VP
https://t.co/kKKlBGH78Q
https://t.co/9k6lvCbtuZ
https://t.co/tvoyhKqVkF
2
1
15
Check out this detailed n-day writeup by @oceankex, a former web security intern at STAR Labs I mentored, and how it led to two other bugs hidden in plain sight being discovered!
Our team member, @Creastery , & our former intern, @oceankex, prepared this some time ago. "Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)" https://t.co/XEEzSmFANT While writing this, they found another bug https://t.co/bUK1KEJNqh We hope you enjoy it
1
0
7
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
starlabs.sg
Summary: Product Trend Micro Apex Central 2019 Vendor Trend Micro Severity High Affected Versions Apex Central 2019 Build <= 6016 Tested Version(s) Apex Central 2019 Build 6016 CVE Identifier...
0
41
165