TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

GitHub Enterprise SQL Injection

346 pointsby urigover 8 years ago

7 comments

treehau5over 8 years ago
Although I am impressed by the work, I dislike these writeups.<p>In similar bug bounty posts, a user will post all this brilliant setup code, these tools I never heard of to decompile binaries, view source, get through obfuscation, etc.<p>Then, when you get to the meat and bones, they just go &quot;Ok and vulnurability is here, and you exploit it like this. Ta data.&quot;<p>It&#x27;s very anti-climatic, and I don&#x27;t learn much in the process. I would like to learn more about what your thought process is like after you get the code. How did you narrow your focus on ActiveRecord? Did you just know from seeing it? I would love to learn more. Do expert pen-testers have this checklist of exploits they try?<p>Sorry if it sounds like whiny, I would just love it if these had more meat in the actual finding of the exploit as they did the setup.
评论 #13348331 未加载
评论 #13348589 未加载
评论 #13349049 未加载
Illniyarover 8 years ago
It still boggles my mind that sql injection is a thing in 2016, let alone in a modern codebase from a great software company with amazing engineers.<p>Somehow we (the programming profession) are doing this whole thing wrong, and I&#x27;m not sure why.
评论 #13351073 未加载
评论 #13350915 未加载
评论 #13350222 未加载
评论 #13349243 未加载
qz_over 8 years ago
Props to OP for finding the vulnerability without knowing Ruby on Rails.
评论 #13347960 未加载
terichoover 8 years ago
It&#x27;s hidden way down at the bottom, but I found the Timeline to be my favourite part :)<p>Edit: Can&#x27;t see to format it correctly, just check the original source.
评论 #13348063 未加载
lukasmover 8 years ago
For those that this website is marked as dangerous <a href="http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:z7yyaxITRoAJ:blog.orange.tw&#x2F;2017&#x2F;01&#x2F;bug-bounty-github-enterprise-sql-injection.html+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=uk" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:z7yyaxI...</a>
评论 #13347403 未加载
评论 #13347349 未加载
评论 #13348045 未加载
mankash666over 8 years ago
I&#x27;m curious if the author decompiled binaries generated from C code. In that case, I understand how one could &quot;dis assemble&quot; binaries, but generating readable C code, is that possible?
评论 #13348877 未加载
评论 #13350555 未加载
评论 #13348749 未加载
sytseover 8 years ago
Glad to see the communication between Orange and GitHub went great. Both did the right thing after discovering the flaw. Orange reported it and GitHub fixed it and allowed Orange to publish a blog post. I have to admit I&#x27;m a bit of a fanboy of HackerOne.<p>The custom SQL query is something that is hard to prevent. It is still hard to use ActiveRecord&#x2F;Arel for everything. I&#x27;m sure GitLab is not immune to it.<p>GitHub chooses to encrypt their source code to prevent modifications. Our experience at GitLab is that customer modifications don&#x27;t cause a lot of extra load on our support team. But of course that might be caused by having different architectures and customers.
评论 #13347397 未加载
评论 #13347402 未加载