Helon
kiwifarms.net
- Joined
- Apr 16, 2025
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
This may come to you as a shock, but I don't consider some random twitter troons to be "mainstream".
The most mainstream coverage I've seen so far is this.This may come to you as a shock, but I don't consider some random twitter troons to be "mainstream".
you ruined my night thanks
all of the image uploads make calls to command line processors that are intended to be the file type validation method. the only sanitization the others have is anti cmd injection. old versions of gifsicle have rce vulns, and old versions of pngcrush have BoF DoS vulns that maybe could be weaponized to get RCE by someone good at binex. the cmd injection filters would give you some bad bytes, but its possible that every single file upload type is vulnerable.Taking longer than expected I fucking hate this codebase.
View attachment 7233849
No MIME confirmed, assumes PDFs are safe and passes them to the shell, Ghostscript isn't sandboxed and runs as the same process I'm fucking losing my mind.
I have two versions of the server running right now to see how Ghostscript interacts with legacy FBSD. Ghostscript itself was really vulnerable ~v9.x so it's a rabbit hole right now.
You mean there are other boards besides /pol/?The most mainstream coverage I've seen so far is this.
He did research on what /qa/ is and didn't call 4chan a heckin nazi website so it'd already ahead of most journos.
all of the image uploads make calls to command line processors that are intended to be the file type validation method. the only sanitization the others have is anti cmd injection. old versions of gifsicle have rce vulns, and old versions of pngcrush have BoF DoS vulns that maybe could be weaponized to get RCE by someone good at binex. the cmd injection filters would give you some bad bytes, but its possible that every single file upload type is vulnerable.
Do you think it's possible this exploit has been used in the past by bad actors who DIDN'T make it obvious they breached the server?all of the image uploads make calls to command line processors that are intended to be the file type validation method. the only sanitization the others have is anti cmd injection. old versions of gifsicle have rce vulns, and old versions of pngcrush have BoF DoS vulns that maybe could be weaponized to get RCE by someone good at binex. the cmd injection filters would give you some bad bytes, but its possible that every single file upload type is vulnerable.
yeah, I really like his christmas album, I had it on casette as a kid. I got into the sax a little bit because I'm a big fan of Chuck Greenberg (another fuckin' jew but what can you do) of Shadowfax. I kind of have a Lyricon
Do you like Kenny G? His early work was a little too synthpop for my tastes, but when Gravity came out in '85, I think he really came into his own, commercially and artistically. The whole album has a clear, crisp sound, and a new sheen of consummate professionalism that really gives the songs a big boost. He's been compared to Grover Washington Jr, but I think Kenny has a much more bitter, cynical sense of humor. In '86, Kenny released this, Duotones, his most accomplished album. I think his undisputed masterpiece is "You Make Me Believe", a song so saccharine, most people probably don't listen to the lyrics. But they should, because it's not just about the pleasures of companionship, and the importance of romantic dedication, it's also a personal statement about Kenny himself.
Taking longer than expected I fucking hate this codebase.
View attachment 7233849
No MIME confirmed, assumes PDFs are safe and passes them to the shell, Ghostscript isn't sandboxed and runs as the same process I'm fucking losing my mind.
I have two versions of the server running right now to see how Ghostscript interacts with legacy FBSD. Ghostscript itself was really vulnerable ~v9.x so it's a rabbit hole right now.
all of the image uploads make calls to command line processors that are intended to be the file type validation method. the only sanitization the others have is anti cmd injection. old versions of gifsicle have rce vulns, and old versions of pngcrush have BoF DoS vulns that maybe could be weaponized to get RCE by someone good at binex. the cmd injection filters would give you some bad bytes, but its possible that every single file upload type is vulnerable.
If you're willing, I would love to read a longform post or thread with your analysis of the hack and other flaws in 4chan's code and the environment in which it ran.It gets worse.
I believe Null has a new forum software in the works, and this is one of his planned features.Would be nice to look at a reply on a thread and see if it got quoted a lot of times, and quickly preview the replies, you know?
Yes, absolutely. It is not even a controversial question really. All you need is one successful RCE chain and then you get a shell and then you do whatever you want. You can be as quiet and non-destructive as you want after that point.Do you think it's possible this exploit has been used in the past by bad actors who DIDN'T make it obvious they breached the server?
Like just someone exporting data and then returning everything to normal?
I think it's a fun throwback honestly, I legitimately forgot about 4chumblr.
View attachment 7232110
Effortless fireship WThe most mainstream coverage I've seen so far is this.
He did research on what /qa/ is and didn't call 4chan a heckin nazi website so it's already ahead of most journos.