[bounty] Public Private Android Keys and Docker Escapes

This week we have a crazy crypto fail where some Android devices had updates signed by publicly available private keys, as well as some Docker container escapes. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/239.html [00:00:00] Introduction [00:00:22] Missing signs: how several brands forgot to secure a key piece of Android [00:13:37] ModSecurity: Path Confusion and really easy bypass on v2 and v3 [00:21:24] runc process.cwd & leaked fds container breakout [CVE-2024-21626] [00:24:23] Buildkit GRPC SecurityMode Privilege Check [CVE-2024-23653] [00:27:49] Jumpserver Preauth RCE Exploit Chain [00:43:49] 500$: MFA bypass By Race Condition [00:49:52] HTTP Downgrade attacks with SmuggleFuzz The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9

Om Podcasten

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.