Rory McNamara
@PsychoMario
Followers
471
Following
30
Media
2
Statuses
57
I had a play with some vector databases and identified a new(?) method for persistent prompt injection. Read about it here:
🚨 New threat: Persistent prompt injection with poisoned vector databases! Discover how “RAGPoison” exposes this risk and learn how to protect your LLMs. Read more: https://t.co/D5icj6zpOF
#RAGPoison #PromptInjection #Cybersecurity
0
0
0
🚨 New threat: Persistent prompt injection with poisoned vector databases! Discover how “RAGPoison” exposes this risk and learn how to protect your LLMs. Read more: https://t.co/D5icj6zpOF
#RAGPoison #PromptInjection #Cybersecurity
labs.snyk.io
Explore RAGPoison, a novel prompt injection technique that exploits poisoned vector databases in LLM systems. Learn how it works and discover essential mitigations to protect your AI applications.
1
2
6
/1 🚨 mega-thread on exploiting MCP servers via prompt injection, buckle up 👇
5
26
77
Major credit to the NixOS, Lix, and Guix teams for their incredibly fast response and for issuing patches to fix the issues. Want to see the full exploit chain, from file descriptor exfiltration to root shell? Read the full technical deep dive on our blog:
labs.snyk.io
Discover a privilege escalation chain in NixOS & Snyk Labs combined multiple vulnerabilities, including race conditions, to achieve full root access on a stock system.
0
2
2
With arbitrary directory deletion, we targeted /tmp to race another Nix build process. This second race allowed us to hijack a chown call, letting us change the ownership of any file on the system to a user we controlled. The target? /etc/pam.d.
1
1
1
This foothold allowed us to create a classic Time-of-Check, Time-of-Use (TOCTOU) race condition. By modifying a directory while the garbage collector was running, we could trick a privileged Nix process into emptying any directory on the system.
1
1
0
Our path to root began by looking at failed builds. We found that we could exfiltrate a file descriptor from a sandboxed build process, giving us the ability to modify a directory inside the supposedly immutable /nix/store even after the build was finished!
1
1
0
We just dropped a deep dive on a series of vulnerabilities the Snyk Security Labs team found in NixOS! When chained together, they allow for a full privilege escalation from any user to root on a default installation. #NixOS #Linux #infosec #vulnerability
1
5
10
NixOS is super neat, I managed to find some vulnerabilities resulting in a pretty cool privilege escalation. I wrote about it here: https://t.co/N4S64hMMjL
2
28
63
Great work from my team: Is your local AI tooling really safe from attack?
🚨 Security alert! We found vulnerabilities in Cortex.cpp (Jan AI). While self-hosted #AI is booming, security can't be an afterthought. Dive into our findings and how we addressed them. 👇
0
0
0
Unveiling the mysteries of ComfyUI Custom Node Vulnerabilities with our latest blog post! 🕵️♂️ Dive deeper into plugin ecosystem security with our seclabs team's in-depth exploration. Don't miss it! ⚡ #AppSec #AIsecurity #ComfyUI More here:
labs.snyk.io
This research focuses on ComfyUI, a popular stable diffusion platform with over 1,300 custom node extensions available. Through real-world examples, we demonstrate how even seemingly minor vulnerab...
0
2
12
Ever wondered how Spring properties can be leveraged to obtain Remote Code Execution (RCE)? Our seclabs team expanded on @steventseeley's research—check it out here: https://t.co/DsIRlRSAYO
#Cybersecurity #RCE #JavaSecurity #AppSec #SpringFramework
labs.snyk.io
this article introduces two methods for leveraging Logback configuration to achieve Remote Code Execution (RCE) in Spring Boot applications. These techniques are effective on the latest version of...
0
12
23
Vulnerability Alert: Our SecLabs uncovered CVE-2024-21545 in Proxmox VE 8.2.2, allowing attackers with limited permissions to potentially take full control of systems. Explore our breakdown of the discovery, exploitation, and mitigation process.
labs.snyk.io
Read about a critical vulnerability (CVE-2024-21545) in Proxmox VE that allows attackers to gain full control of the system. By exploiting a flaw in the API handling, attackers with limited permiss...
0
2
1
Proxmox CVE-2024-21545! I turned a local file read into full root command execution on Proxmox VE 8.2.2. Pretty cool chain if I do say so myself. Writeup:
labs.snyk.io
Read about a critical vulnerability (CVE-2024-21545) in Proxmox VE that allows attackers to gain full control of the system. By exploiting a flaw in the API handling, attackers with limited permiss...
0
16
27
I had some fun exploiting Ubuntu 24.04 when it came out. Read more about it here:
Our security labs team found a privilege escalation vulnerability chain in Ubuntu 24.04. Read about the journey of discovery and exploitation here: https://t.co/CLtJJicd5P
#vulnerability #0day
2
8
43
Your #code might be more vulnerable than you think. 😱 #RepoJacking is a powerful, yet widely unknown threat to your software supply chain. Learn how this attack works and how to defend against it in our latest blog post:
labs.snyk.io
0
2
2
New research: Exploiting WebSockets for HTTP cache poisoning & bypassing Istio RBAC with HTTP response header injection. Learn how these attacks work & secure your apps. https://t.co/GWrorOwt3b
#websecurity #istio #securityresearch
labs.snyk.io
This post outlines what we believe to be novel attacks against HTTP application middleware based on the simple foundation of HTTP response header injection.
0
1
1
Learn how Snyk security researchers uncovered the #LeakyVessels container breakout Docker vulnerabilities assigned CVE-2024-21626, CVE-2024-23652, CVE-2024-23651, and CVE-2024-23653.
labs.snyk.io
0
2
4
🚨 BREAKING 🚨The Snyk research team has uncovered 4 critical security vulnerabilities (#LeakyVessels) impacting core container tech including Docker, runc & related cloud infrastructure like Kubernetes. Get more details, including mitigation tips here 👉
labs.snyk.io
Snyk Security Labs Team has identified four container breakout vulnerabilities in core container infrastructure components including Docker and runc, which also impacts Kubernetes.
0
31
59