WALL OF SHEEP

WHAT IS THE WALL OF SHEEP?

Traditionally, the Wall of Sheep is an interactive demonstration of what can happen when network users let their guard down. We passively observe the traffic on a network, looking for evidence of users logging into email, web sites, or other network services without the protection of encryption. Those we find get put on the Wall of Sheep as a good-natured reminder that a malicious person could do the same thing we did . . . with far less friendly consequences. More importantly, we strive to educate the “sheep” we catch to prevent leaks in the future.

Now I use the term Wall of Sheep to denote the list of security issues that were “passively” observed when I am enjoying my security research as well as ethical hacking.

SHEEPS I CAUGHT

CVE-2019-18954 pomelo internal state manipulation

Mongo-608 Mongodb Query Condition Abuse

CVE-2019-18608 Cezerin Unauthorized Order Modification

CVE-2019-18413 class-validator Bypass

CVE-2019-17426 Mongoose Query Condition Abuse

CVE-2019-13623 Ghidra Arbitrary Code Execution

CVE-2019-13624 ONOS Remote Command Execution

CVE-2018-1132 Opendaylight’s SDNInterfaceapp module SQL injection.

CVE-2018-15595 Opendaylight’s TSDR Module Denial of Service

CVE-2018-1999020 ONOS Controller Directory Traversal

CVE-2018-1000614 ONOS Controller Notification XXE

CVE-2018-1000615 ONOS Controller OVSDB Remote Denial of Service

CVE-2018-1000616 ONOS Controller XMLCONFIGPARSER XXE

CVE-2018-1000617 Atlassian Floodlight Controller Remote Denial of Service

CVE-2018-1000163 Atlassian Floodlight Controller Web Console Cross-Site Scripting