Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors.

I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors.

Scheduled Pinned Locked Moved Uncategorized
12 Posts 9 Posters 18 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sash@hachyderm.ioS sash@hachyderm.io

    I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

    My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

    Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

    Link Preview Image
    sash@hachyderm.ioS This user is from outside of this forum
    sash@hachyderm.ioS This user is from outside of this forum
    sash@hachyderm.io
    wrote last edited by
    #2

    My disclosure process with RIPE NCC took 14 months, 26 messages, and included two incorrect fixes for the same vulnerability. I wrote about the process, with thoughts on what better would look like for RIPE NCC and others: https://mxsasha.eu/posts/ripe-ncc-disclosure-retrospective/

    1 Reply Last reply
    0
    • sash@hachyderm.ioS sash@hachyderm.io

      I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

      My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

      Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

      Link Preview Image
      wall_e@ioc.exchangeW This user is from outside of this forum
      wall_e@ioc.exchangeW This user is from outside of this forum
      wall_e@ioc.exchange
      wrote last edited by
      #3

      @sash amazing work!

      1 Reply Last reply
      0
      • sash@hachyderm.ioS sash@hachyderm.io

        I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

        My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

        Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

        Link Preview Image
        nyanbinary@infosec.exchangeN This user is from outside of this forum
        nyanbinary@infosec.exchangeN This user is from outside of this forum
        nyanbinary@infosec.exchange
        wrote last edited by
        #4

        @sash this is very cool & absolutely gets me thinking about the need for separating standard sessions/identities from administrative sessions again

        sash@hachyderm.ioS 1 Reply Last reply
        0
        • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

          @sash this is very cool & absolutely gets me thinking about the need for separating standard sessions/identities from administrative sessions again

          sash@hachyderm.ioS This user is from outside of this forum
          sash@hachyderm.ioS This user is from outside of this forum
          sash@hachyderm.io
          wrote last edited by
          #5

          @nyanbinary yes, although in this case, "administrative" includes almost any RIPE NCC platform, like e-learning courses, the blog (RIPE Labs), running an Atlas measurement, submitting a talk to a RIPE meeting, and so on. The same session token covers all services.

          nyanbinary@infosec.exchangeN 1 Reply Last reply
          0
          • sash@hachyderm.ioS sash@hachyderm.io

            @nyanbinary yes, although in this case, "administrative" includes almost any RIPE NCC platform, like e-learning courses, the blog (RIPE Labs), running an Atlas measurement, submitting a talk to a RIPE meeting, and so on. The same session token covers all services.

            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchange
            wrote last edited by
            #6

            @sash ye, thats where the identity separation would come into play for me - the account that can nuke your RPKI shouldn't be the one that you do for e-learning. Though I haven't worked with RIPE NCC so I dont know how feasible that is.

            1 Reply Last reply
            0
            • sash@hachyderm.ioS sash@hachyderm.io

              I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

              My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

              Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

              Link Preview Image
              jeroen@secluded.chJ This user is from outside of this forum
              jeroen@secluded.chJ This user is from outside of this forum
              jeroen@secluded.ch
              wrote last edited by
              #7

              @sash Great work Sasha (as many other things you have done! :), and thank you for responsibly disclosing it and patiently working with them to properly resolve it.

              1 Reply Last reply
              0
              • sash@hachyderm.ioS sash@hachyderm.io

                I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                Link Preview Image
                photovince@mastodon.socialP This user is from outside of this forum
                photovince@mastodon.socialP This user is from outside of this forum
                photovince@mastodon.social
                wrote last edited by
                #8

                @sash 🙏 And we live another day

                1 Reply Last reply
                0
                • sash@hachyderm.ioS sash@hachyderm.io

                  I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                  My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                  Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                  Link Preview Image
                  nicksilkey@hachyderm.ioN This user is from outside of this forum
                  nicksilkey@hachyderm.ioN This user is from outside of this forum
                  nicksilkey@hachyderm.io
                  wrote last edited by
                  #9

                  @sash thank you for your service - and a great write up for all on your discovery! ✌️💙

                  1 Reply Last reply
                  0
                  • sash@hachyderm.ioS sash@hachyderm.io

                    I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                    My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                    Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                    Link Preview Image
                    fanf@mendeddrum.orgF This user is from outside of this forum
                    fanf@mendeddrum.orgF This user is from outside of this forum
                    fanf@mendeddrum.org
                    wrote last edited by
                    #10

                    @sash « I stumbled into the first vulnerability while debugging the reverse DNS zone for my IPv6 range in RIPEstat, RIPE NCC’s network information tool. A blue marquee started scrolling across the page, from an XSS payload I had put in my DNS server months earlier. »

                    actual irl lol, excellent work

                    1 Reply Last reply
                    0
                    • sash@hachyderm.ioS sash@hachyderm.io

                      I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                      My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                      Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                      Link Preview Image
                      rmd1023@infosec.exchangeR This user is from outside of this forum
                      rmd1023@infosec.exchangeR This user is from outside of this forum
                      rmd1023@infosec.exchange
                      wrote last edited by
                      #11

                      @sash Interesting!

                      1 Reply Last reply
                      0
                      • sash@hachyderm.ioS sash@hachyderm.io

                        I found a chain of vulnerabilities in systems at RIPE NCC, operator of one of five global RPKI trust anchors. A single click on an ordinary-looking link was enough to disconnect a network from the internet.

                        My entry points were debugging fields in DNS and crafted TLS certificates. From there, I escalated to the RPKI Dashboard, which controls which networks are authorised to announce your IP addresses to the internet, and the RIPE Database, which stores routing policy. All vulnerabilities have been fixed.

                        Full write-up: https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                        Link Preview Image
                        theorangetheme@en.osm.townT This user is from outside of this forum
                        theorangetheme@en.osm.townT This user is from outside of this forum
                        theorangetheme@en.osm.town
                        wrote last edited by
                        #12

                        @sash This is phenomenal! I'm reading this on my lunch break.

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups