Peter Stöckli's Avatar

Peter Stöckli

@ulldma.bsky.social

Security Researcher and Software Engineer at GitHub Security Lab

416 Followers  |  217 Following  |  8 Posts  |  Joined: 30.05.2023  |  1.6225

Latest posts by ulldma.bsky.social on Bluesky

Preview
GitHub - cryptpad/cryptpad: Collaborative office suite, end-to-end encrypted and open-source. Collaborative office suite, end-to-end encrypted and open-source. - cryptpad/cryptpad

Meinst du CryptPad? github.com/cryptpad/cry...

07.08.2025 12:49 — 👍 0    🔁 0    💬 1    📌 0
Apple WWDC 2006-Windows Vista Copies Mac OS X
YouTube video by JoshuaG Apple WWDC 2006-Windows Vista Copies Mac OS X

This time Cupertino started the photocopiers 😅

www.youtube.com/watch?v=N-2C...

10.06.2025 15:04 — 👍 1    🔁 0    💬 0    📌 0
Preview
[In Person] Troy Hunt Have I Been Pwned Alpine Grand Tour Zürich , Di., 17. Juni 2025, 18:00 | Meetup **IN-PERSON** Troy Hunt meetup at **Kraftwerk in Zurich** This meetup is a collaboration between several Swiss User Groups: [Azure Zurich User Group ](https://www.azurezur

I'm coming to Switzerland! Join me at the Microsoft Azure Zürich User Group in only a few weeks from now: www.meetup.com/de-DE/micros...

27.05.2025 00:03 — 👍 19    🔁 8    💬 1    📌 0
Preview
Bypassing MTE with CVE-2025-0072 See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.

Our team member Man Yue Mo is back, showing a new way to bypass MTE protection on Android phones with CVE-2025-0072. github.blog/security/vul...

23.05.2025 14:52 — 👍 6    🔁 3    💬 0    📌 0
Post image 15.04.2025 15:25 — 👍 3    🔁 0    💬 1    📌 0
Preview
Files through the eyes of a hacker

Next Monday I'm doing a 2h webinar on files as seen through the eyes of a cybersecurity researcher. This will cover useful stuff for programmers, more junior pentesters, and other tech enthusiasts who enjoy knowing how stuff works on a computer :)
hexarcana.ch/lp/files/?ut...

26.03.2025 08:54 — 👍 3    🔁 1    💬 2    📌 0

Note: the payloads displayed in the video have been faked to avoid disclosing details of how to implement a working exploit. The details of how to implement a working exploit have not been released yet.

More info at: github.blog/security/sig...

13.03.2025 16:09 — 👍 1    🔁 0    💬 0    📌 0
Video thumbnail

In this demonstration I show the impact of CVE-2025-25291/CVE-2025-25292, an authentication bypass in ruby-saml used by high profile OSS projects such as GitLab. My team coordinated with both the ruby-saml maintainer and GitLab to get this vulnerability fixed and patches are available at gh.io/glfx

13.03.2025 16:08 — 👍 22    🔁 3    💬 1    📌 0
Preview
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.

If you're using ruby-saml or omniauth-saml for SAML authentication make sure to update these libraries as fast as possible! Fixes for two critical authentication bypass vulnerabilities were published today (CVE-2025-25291 + CVE-2025-25292).

github.blog/security/sig...

12.03.2025 21:50 — 👍 11    🔁 10    💬 1    📌 0
Preview
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.

In this blog post, we detail newly discovered authentication bypass vulnerabilities in the ruby-saml library used for single sign-on (SSO) via SAML on the service provider (application) side. github.blog/security/sig...

12.03.2025 21:33 — 👍 7    🔁 6    💬 0    📌 0

Hello from the GitHub Security Lab!
We are a team of security experts who cultivate a collaborative community where developers and security professionals come together to secure open source software.

06.02.2025 08:29 — 👍 10    🔁 5    💬 2    📌 0
Post image

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! github.blog/security/vul...

22.01.2025 18:16 — 👍 28    🔁 16    💬 1    📌 0
Intercepting Linux Applications

mitmproxy 11.1 is out! 🥳

We now support *Local Capture Mode* on Windows, macOS, and - new - Linux! This allows users to intercept local applications even if they don't have proxy settings.

More details are at mitmproxy.org/posts/local-.... Super proud of this team effort. 😃

12.01.2025 13:59 — 👍 75    🔁 23    💬 2    📌 2
Preview
CodeQL zero to hero part 4: Gradio framework case study Learn how I discovered 11 new vulnerabilities by writing CodeQL models for Gradio framework and how you can do it, too.

🚀 CodeQL zero to hero part 4: Gradio case study is out! This time we dive into how I wrote CodeQL to support the @hf.co's Gradio framework, scaled the research to a thousand repositories on GitHub, and found 11 vulnerabilities.

gh.io/codeql-part-4

11.12.2024 18:59 — 👍 4    🔁 1    💬 0    📌 0
Post image Post image Post image

My latest blog post is live! Check your Ruby on Rails applications for the use of params[:_json]

nastystereo.com/security/rai...

10.12.2024 08:30 — 👍 34    🔁 14    💬 1    📌 2
Post image

My latest blog post is live! nastystereo.com/security/cro...

Read how to send a cross-site POST without including a Content-Type header (without CORS). It even works with navigator.sendBeacon

27.11.2024 09:10 — 👍 80    🔁 29    💬 3    📌 4
Remote Code Execution with Spring Properties Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting...

I just wrote a new blog post! This is how I (ab)used a jailed file write bug in Tomcat/Spring. Enjoy!

Remote Code Execution with Spring Properties :: srcincite.io/blog/2024/11...

26.11.2024 23:57 — 👍 76    🔁 36    💬 1    📌 2
Post image

I just published a new blog post sharing an improved Deserialization Gadget Chain for Ruby!
It builds on the work of others, including Leonardo Giovanni, @ulldma.bsky.social and @vakzz.bsky.social

nastystereo.com/security/rub...

25.11.2024 05:27 — 👍 15    🔁 5    💬 0    📌 0
Preview
Execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities work in Ruby projects Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog pos...

If you're interested in the inner workings of unsafe deserialization in Ruby I got you covered with a blog post that explains in detail how a concrete gadget chain works:

github.blog/2024-06-20-e...

Including proof of concept exploits that work up to Ruby 3.3 for Oj (JSON), Ox (XML) and more.

24.06.2024 11:30 — 👍 5    🔁 1    💬 0    📌 0
Preview
Execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities work in Ruby projects Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog pos...

If you're interested in the inner workings of unsafe deserialization in Ruby I got you covered with a blog post that explains in detail how a concrete gadget chain works:

github.blog/2024-06-20-e...

Including proof of concept exploits that work up to Ruby 3.3 for Oj (JSON), Ox (XML) and more.

24.06.2024 11:30 — 👍 5    🔁 1    💬 0    📌 0
Hack.lu 2023: Yeti: Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea
Hack.lu 2023: Yeti: Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea

The talk I have at @hack_lu about Yeti and our vision of the future of forensics intelligence is online!

We're already getting lots of FRs, which we'll do our best to implement before our official release EOM.

Hope I made @Sebdraven proud 🥹 #dfir #infosec

19.10.2023 09:19 — 👍 5    🔁 4    💬 0    📌 0
Screenshot: A JavaScript alert message is displayed to demonstrate that a cross-site scripting vulnerability exists. This alert was triggered when the user clicked on the “Proceed” button on a link provided by the attacker. Instead of the “malicious” attacker-supplied JavaScript URL, the user only sees what the attacker wants the user to see, in this case: a harmless link to securitylab.github.com.

Screenshot: A JavaScript alert message is displayed to demonstrate that a cross-site scripting vulnerability exists. This alert was triggered when the user clicked on the “Proceed” button on a link provided by the attacker. Instead of the “malicious” attacker-supplied JavaScript URL, the user only sees what the attacker wants the user to see, in this case: a harmless link to securitylab.github.com.

Where I'll demonstrate some typical Ruby on Rails gotchas on a real project:
https://github.blog/2023-07-28-closing-vulnerabilities-in-decidim-a-ruby-based-citizen-participation-platform/

E.g. Why you shouldn't match strings with ^ and $ when using Regex in Ruby.

31.07.2023 15:03 — 👍 4    🔁 1    💬 0    📌 0

Head of cyber at the Romanian Intelligence Service:

Solarwinds attack didn't impact Romania because companies didn't pay their support and were lagging behind so many versions the exploited vulnerability didn't apply

22.06.2023 01:01 — 👍 4    🔁 3    💬 0    📌 0

@ulldma is following 20 prominent accounts