[bounty] A Zoom RCE, VMware Auth Bypass, and GitLab Stored XSS

Published: May 31, 2022, 8 p.m.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-zoom-rce-vmware-auth-bypass-and-gitlab-stored-xss.html

\n

Last bounty episode before our summer vacation, and we are ending off with some cool issues. XML Stanza smuggling in Zoom for a MitM attack, an odd auth bypass, a Gitlab Stored XSS and gadget based CSP bypass, and an interesting technique to leverage a path traversal/desync against NGINX Plus

\n

[00:01:00] How I hacked CTX and PHPass Modules

\n

[00:10:55] [Zoom] Remote Code Execution with XMPP Stanza Smuggling

\n

[00:19:38] VMware Authentication Bypass Vulnerability [CVE-2022-22972]

\n

[00:23:05] Breaking Reverse Proxy Parser Logic

\n

[00:26:44] [GitLab] Stored XSS in Notes (with CSP bypass)

\n

[00:37:13] GhostTouch: Targeted Attacks on Touchscreens without Physical Touch

\n

[00:48:00] Resources While We Are Gone

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.