Avatar
Matt Hamilton [Maryland]
8757127d57629a9a1b7c04bd443049db086850d1d33bc1964e6485992cde22af
Tip of the spear Gen Z. With my right hand, I create. With my left, I destroy. Alignment: Chaotic good.

My favorite type of person is the guy you invite to the party because you feel bad that he’s socially isolated, then he acts like complete asshole and talks about how much the party sucks the whole time.

Yeah, we all know that guy.

I never give up on that guy and always invite him. I don’t know if it’s out of pity or survival instinct, because that guy is also the first one to be skinned and eaten alive by the rest of the group if they’re stranded on a island. He ensures I don’t go hungry.

nostr:npub1xpzrkaxt97zguqc5gj3xpkf6ymmxq363zp9xhgdw5h4arvhnr9wsancqs2 I'll read it at some point. Too busy writing and don't want to poison my brain with too much external influence.

nostr:npub1a0qxpztc73n47hp37wxfqt6thaakt97seu7satuv7uz65mnlq37sxu3tmr I'm Gen Z, I know very little prince music and have never seen his music videos, heh.

Regardless, I don't think that is it. It wouldn't have just been one bird like in the video, it would have likely been a sky shot of multiple birds released all at once - they were racing pigeons, so they would have been uncaged to fly home.

Music Video trivia for NAS.

My grandfather raced pigeons and once release pigeons from a warehouse for a music video used by a popular band at the time. Nobody alive in the family can remember who the band was. The best guess was The Police, but I haven't been able to find any music videos by The Police with pigeons.

Do you know of any music videos from the 80s that have a flock of pigeons (being released from a warehouse)?

nostr:npub1halzvw4rckekndd3l6tv5mzyx9m07v60wnearrfw8x4arcjpm82styg05e nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub1ycnhgr56efxcpvhu7q0er9gqjqttpwhgqgjfgjaj7gpfea5g6xhq4zgshs file is fine as long as it’s a tmpfs (aka, written to ram and not disk) and also unmounted, deleted, or otherwise made inaccessible after init where it’s been read by the program.

nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub1ycnhgr56efxcpvhu7q0er9gqjqttpwhgqgjfgjaj7gpfea5g6xhq4zgshs ok, but understand that means all the secrets are effectively on disk at /proc/self/environ. An arbitrary file read (like the two recent Pleroma issues) means full secret disclosure.

I would really recommend against it.

Since it came up in a thread re: Pleroma security, general reminder to dev friends:

NEVER STORE SECRETS IN ENVIRONMENT VARIABLES.

JUST DON'T DO IT.

seriously. don't.

https://forcesunseen.com/blog/stop-storing-secrets-in-environment-variables

https://github.com/forcesunseen/environ

nostr:npub1yck44z5zqxmwpqzqs75ay6ffjdw843ng9p6mz0lzfff3fgz2djlsngujmw nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 Yeah, in this case I wouldn't blame Pleroma devs entirely, what I said was mostly a joke.

Erlang/Elixir is a shit and immature language, so the fact that "the most mature [XML parser] in the ecosystem" is vulnerable to vulns from the early 2000's comes as no surprise to me.

nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 XXE occurs when the XML parsing library evaluates external entities, often allowing referencing files on the local FS, though it's bad even if it only resolves remote resources (think, AWS metadata endpoints).

https://gist.github.com/Eriner/2118b0ec479c57f980e39d3763195266

In the XML above (sorry for gist, foiled by CF WAF), the external entity reads /etc/passwd and returns it in the response, replacing the evaluation with &xxe

nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 Exploitation is trickier if the response is blind, but sometimes still possible, dunno if that is the case here or not, but I assume it's not blind. But even if you can't read local files, SSRF via XXE is still dangerous (think, AWS metadata endpoints rather than file:/// uris).

nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 XXE occurs when the XML parsing library evaluates external entities, often allowing referencing files on the local FS, though it's bad even if it only resolves remote resources (think, AWS metadata endpoints).

https://gist.github.com/Eriner/2118b0ec479c57f980e39d3763195266

In the XML above (sorry for gist, foiled by CF WAF), the external entity reads /etc/passwd and returns it in the response, replacing the evaluation with &xxe

nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 yeah, XXE. Means anything that can submit an XML document that the server parses can read arbitrary files on the server, same as the other issue. Actually worse if this doesn’t require Auth. XXE is fixed by not using a shit and brain-damaged parsers, which nobody should be using. This is straight outta 2004.

Abandon hope, all ye who enter. Pleroma is fucked and was made by retards.