[bounty] Deleting Rubygems, BIG-IP Auth Bypass, and a Priceline Account Takeover

Published: May 17, 2022, 8 p.m.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/yanking-rubygems-big-ip-auth-bypass-and-a-priceline-account-takeover.html

\n

A lot of cool little bugs this week with some solid impact, Facebook and Priceline account takeovers, F5 iControl Authentication Bypass, and a couple other logic bugs.

\n

[00:01:55] rubygems CVE-2022-29176 explained

\n

[00:06:09] Multiple bugs chained to takeover Facebook Accounts which uses Gmail

\n

[00:15:16] [curl] curl removes wrong file on error [CVE-2022-27778]

\n

[00:18:33] [Priceline] Account takeover via Google OneTap

\n

[00:22:14] F5 iControl REST Endpoint Authentication Bypass Technical Deep Dive

\n

[00:29:02] The Underrated Bugs, Clickjacking, CSS Injection, Drag-Drop XSS, Cookie Bomb, Login+Logout CSRF\u2026

\n

[00:30:20] Hunting evasive vulnerabilities

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.