Our team is hiring! If you are passionate about finding bugs in code, exploiting them in creative ways, and sharing your findings on our blog, apply here: jobs.lever.co/sonarsource/...
Our team is hiring! If you are passionate about finding bugs in code, exploiting them in creative ways, and sharing your findings on our blog, apply here: jobs.lever.co/sonarsource/...
π§ A fixed vulnerability that comes back to life?
This could have happened in GitHub Actions until yesterday! Learn how attackers could have exploited seemingly fixed workflow vulnerabilities:
www.sonarsource.com/blog/zombie-...
#appsec #security #vulnerability
From bit flip to RCE in Ollama! π¦
Our latest blog post explains how a file parsing bug led to an interesting out-of-bounds write primitive. Learn how it could have been exploited in Ollama, a tool to run LLMs locally:
www.sonarsource.com/blog/ollama-...
#security #vulnerability #llm #ai
ππ¦ GitHub Actions offer powerful automation capabilities for CI/CD, but they're not immune to attacks.
Take a look at how we tackle this risk with SonarQube Cloud by diving into real-world vulnerabilities.
www.sonarsource.com/blog/securin...
#appsec #security #vulnerability
Using SonarQube to solve a CTF challenge? Done! β
Learn how we detected a 0-day vulnerability during #KalmarCTF, making us first to solve the challenge! From Zip Slip to RCE, using lazy class loading:
www.sonarsource.com/blog/code-se...
#appsec #CTF #vulnerability
ποΈβοΈTaking a note on security: our latest blog post focuses on Go vulnerabilities, including Arbitrary File Write, XSS, and Misconfiguration. Showcasing our new support for the language in SonarQube Cloud!
www.sonarsource.com/blog/securin...
#appsec #security #vulnerability
π± Ever wondered what vulnerabilities look like in Android apps?
We have 2 real-world examples for you! From simple misconfig to cross-app data flow, learn how vulnerabilities manifest in the Kotlin code of Android apps:
www.sonarsource.com/blog/securin...
#appsec #security #vulnerability
πβ« After compromising every endpoint within an organization, our βCaught in the FortiNetβ blog series comes to an end with one more thing.
Read more about FortiClient's XPC mistake that allows local privilege escalation to root on macOS:
www.sonarsource.com/blog/caught-...
#appsec #security
ππ«·π§Can't control the extension of a file upload, but you want an XSS?
Read more on how we overcame this obstacle to further exploit entire organizations using Fortinet endpoint protection:
www.sonarsource.com/blog/caught-...
#appsec #vulnerability #bugbountytips
πΈοΈπ’Caught in the FortiNet: Exploiting Fortinetβs endpoint protection solution to compromise an entire organization using minimal user interaction.
Dive into our technical analysis of this interesting attack scenario:
www.sonarsource.com/blog/caught-...
#appsec #security #vulnerability
Catch our second talk at #TROOPERS25:
πΈοΈ Caught in the FortiNet: Compromising Organizations Using Endpoint Protection
Yaniv Nizry will tell you the story of multiple vulnerabilities in Fortinet products that can compromise an entire organization, starting with a single click
Title: Scriptless Attacks: Why CSS is My Favorite Programming Language Speaker: Paul Gerste, Vulnerability Researcher, Sonar Date: Wednesday, June 25, 2025 Time: 2:15 pm Location: Track 3
Coming to #TROOPERS25 this week? We'll be there too, presenting our research!
π¨ Scriptless Attacks: Why CSS is My Favorite Programming Language
@pspaul95.bsky.social will convince you why CSS should not be overlooked in client-side web attacks and what is possible without JavaScript today
SQL Injection despite using prepared statements? π§
Turns out that SQL syntax can be ambiguous! Learn how this has led to vulnerabilities in several popular PostgreSQL client libraries:
www.sonarsource.com/blog/double-...
#appsec #security #vulnerability
Scripting Outside the Box! π¦
Last week, we saw JS sandboxing pitfalls in API clients. Today, we continue with more complex sandbox escapes in Bruno and Hoppscotch.
Learn how they work and how to sandbox JS securely in part 2:
www.sonarsource.com/blog/scripti...
#appsec #security #vulnerability
Ever wondered what's going on behind the scenes of your API client? π΅οΈββοΈ
We dug in and found a variety of JS sandboxing pitfalls! Find out how Postman and Insomnia tried to isolate untrusted code and what challenges they faced:
www.sonarsource.com/blog/scripti...
#appsec #security #vulnerability
πβ οΈ Data in danger!
We found an XSS vulnerability in Grafana with the help of SonarQube. Learn about the details in our latest blog post:
www.sonarsource.com/blog/data-in...
#appsec #security #vulnerability
π¦π Our second part of the βDiving Into JumpServerβ series is live:
Read more on how an attacker who bypassed authentication can execute code and fully compromise the JumpServer instance and internal hosts:
www.sonarsource.com/blog/diving-...
#appsec #security #vulnerability
π¦πCompromising bastion host to gain full control over the internal infrastructure.
Read more about the vulnerabilities we uncovered in JumpServer in our recent blog post:
www.sonarsource.com/blog/diving-...
#appsec #security #vulnerability