<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Research on Daniel &#39;f0o&#39; Preussker</title>
    <link>https://f0o.dev/research/</link>
    <description>Recent content in Research on Daniel &#39;f0o&#39; Preussker</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 10 Apr 2021 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://f0o.dev/research/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Kry PCR Travel Certificate</title>
      <link>https://f0o.dev/research/2021/04/kry-pcr-travel-certificate/</link>
      <pubDate>Sat, 10 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://f0o.dev/research/2021/04/kry-pcr-travel-certificate/</guid>
      <description>September Update This is no longer valid as Kry started to comply with EU laws to provide a validation QR code.&#xA;However I have not been given any oportunity to test their new procedures.&#xA;It is therefore unknown whether any internal procedures have changed regarding the issuance of those certificates.&#xA;&amp;ndash;&#xA;Original Covid PCR Travel Certificates have become a necessity for travel.&#xA;The market is full with private labs, pop-up pharmacies and anything in between to provide PCR Travel tests and their certificates.</description>
    </item>
    <item>
      <title>CVE-2019-19687</title>
      <link>https://f0o.dev/research/2019/12/cve-2019-19687/</link>
      <pubDate>Mon, 09 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://f0o.dev/research/2019/12/cve-2019-19687/</guid>
      <description>Another month passes and again I&amp;rsquo;ve been struck by boredom - that&amp;rsquo;s never a good thing! ;)&#xA;This time I had a small adventure with OpenStack Keystone which lead me to the discovery of CVE-2019-19687 / OSSA-2019-006.&#xA;While the previous CVE that I posted here implied certain preconditions to apply to elevate or disclose information, this one does not.&#xA;This issue affects any OpenStack installation running Ussuri, Train or Stein.</description>
    </item>
    <item>
      <title>CVE-2019-17134</title>
      <link>https://f0o.dev/research/2019/10/cve-2019-17134/</link>
      <pubDate>Fri, 04 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://f0o.dev/research/2019/10/cve-2019-17134/</guid>
      <description>When you&amp;rsquo;re on vacation and just can&amp;rsquo;t stay still so you start poking around new things&amp;hellip;&#xA;This time it lead me to discover a severe authentication bypass in OpenStack Octavia LBaaS or better known as CVE-2019-17134 or OSSA-2019-005.&#xA;Patches are available now through pip and RDO. Ubuntu is currently polishing up the packages and will follow soon.&#xA;The attack vector requires the adversary to be on the management network of the LBaaS component, sadly this is often the case to eliminate network complexity.</description>
    </item>
  </channel>
</rss>
