Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors.

I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors.

Scheduled Pinned Locked Moved Uncategorized
12 Posts 9 Posters 18 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sash@hachyderm.ioS sash@hachyderm.io

    I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

    My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

    Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

    Link Preview Image
    wall_e@ioc.exchangeW This user is from outside of this forum
    wall_e@ioc.exchangeW This user is from outside of this forum
    wall_e@ioc.exchange
    wrote last edited by
    #3

    @sash amazing work!

    1 Reply Last reply
    0
    • sash@hachyderm.ioS sash@hachyderm.io

      I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

      My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

      Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

      Link Preview Image
      nyanbinary@infosec.exchangeN This user is from outside of this forum
      nyanbinary@infosec.exchangeN This user is from outside of this forum
      nyanbinary@infosec.exchange
      wrote last edited by
      #4

      @sash this is very cool & absolutely gets me thinking about the need for separating standard sessions/identities from administrative sessions again

      sash@hachyderm.ioS 1 Reply Last reply
      0
      • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

        @sash this is very cool & absolutely gets me thinking about the need for separating standard sessions/identities from administrative sessions again

        sash@hachyderm.ioS This user is from outside of this forum
        sash@hachyderm.ioS This user is from outside of this forum
        sash@hachyderm.io
        wrote last edited by
        #5

        @nyanbinary yes, although in this case, "administrative" includes almost any RIPE NCC platform, like e-learning courses, the blog (RIPE Labs), running an Atlas measurement, submitting a talk to a RIPE meeting, and so on. The same session token covers all services.

        nyanbinary@infosec.exchangeN 1 Reply Last reply
        0
        • sash@hachyderm.ioS sash@hachyderm.io

          @nyanbinary yes, although in this case, "administrative" includes almost any RIPE NCC platform, like e-learning courses, the blog (RIPE Labs), running an Atlas measurement, submitting a talk to a RIPE meeting, and so on. The same session token covers all services.

          nyanbinary@infosec.exchangeN This user is from outside of this forum
          nyanbinary@infosec.exchangeN This user is from outside of this forum
          nyanbinary@infosec.exchange
          wrote last edited by
          #6

          @sash ye, thats where the identity separation would come into play for me - the account that can nuke your RPKI shouldn't be the one that you do for e-learning. Though I haven't worked with RIPE NCC so I dont know how feasible that is.

          1 Reply Last reply
          0
          • sash@hachyderm.ioS sash@hachyderm.io

            I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

            My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

            Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

            Link Preview Image
            jeroen@secluded.chJ This user is from outside of this forum
            jeroen@secluded.chJ This user is from outside of this forum
            jeroen@secluded.ch
            wrote last edited by
            #7

            @sash Great work Sasha (as many other things you have done! :), and thank you for responsibly disclosing it and patiently working with them to properly resolve it.

            1 Reply Last reply
            0
            • sash@hachyderm.ioS sash@hachyderm.io

              I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

              My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

              Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

              Link Preview Image
              photovince@mastodon.socialP This user is from outside of this forum
              photovince@mastodon.socialP This user is from outside of this forum
              photovince@mastodon.social
              wrote last edited by
              #8

              @sash 🙏 And we live another day

              1 Reply Last reply
              0
              • sash@hachyderm.ioS sash@hachyderm.io

                I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                Link Preview Image
                nicksilkey@hachyderm.ioN This user is from outside of this forum
                nicksilkey@hachyderm.ioN This user is from outside of this forum
                nicksilkey@hachyderm.io
                wrote last edited by
                #9

                @sash thank you for your service - and a great write up for all on your discovery! ✌️💙

                1 Reply Last reply
                0
                • sash@hachyderm.ioS sash@hachyderm.io

                  I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                  My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                  Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                  Link Preview Image
                  fanf@mendeddrum.orgF This user is from outside of this forum
                  fanf@mendeddrum.orgF This user is from outside of this forum
                  fanf@mendeddrum.org
                  wrote last edited by
                  #10

                  @sash « I stumbled into the first vulnerability while debugging the reverse DNS zone for my IPv6 range in RIPEstat, RIPE NCC’s network information tool. A blue marquee started scrolling across the page, from an XSS payload I had put in my DNS server months earlier. »

                  actual irl lol, excellent work

                  1 Reply Last reply
                  0
                  • sash@hachyderm.ioS sash@hachyderm.io

                    I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                    My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                    Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                    Link Preview Image
                    rmd1023@infosec.exchangeR This user is from outside of this forum
                    rmd1023@infosec.exchangeR This user is from outside of this forum
                    rmd1023@infosec.exchange
                    wrote last edited by
                    #11

                    @sash Interesting!

                    1 Reply Last reply
                    0
                    • sash@hachyderm.ioS sash@hachyderm.io

                      I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                      My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                      Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                      Link Preview Image
                      theorangetheme@en.osm.townT This user is from outside of this forum
                      theorangetheme@en.osm.townT This user is from outside of this forum
                      theorangetheme@en.osm.town
                      wrote last edited by
                      #12

                      @sash This is phenomenal! I'm reading this on my lunch break.

                      1 Reply Last reply
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups