GeistHaus
log in · sign up

hack.do

Part of hack.do

Recent content on hack.do

stories primary
WinBoat: Drive by Client RCE + Sandbox escape.
A remote webpage can abuse an unauthenticated guest HTTP API to compromise the Windows guest container, then feed a malicious app entry leading to Linux host code execution on click.
https://hack.do/posts/winboat-guest-service-host-rce/
RCE in buf CLI (from http://buf.build)
A malicious protobuf registry can return a file:// verification URL during device auth; the buf CLI opens it via the OS default handler (e.g. macOS open), enabling client-side code execution during login.
https://hack.do/posts/buf-cli-registry-login-rce/
CVE-2025-48938 - GitHub CLI RCE
Remote Code Execution in Github “GH” CLI via custom GitHub Enterprise Server
https://hack.do/posts/cve-2025-48938/
jsonwebtoken: String Payload Parsing Inconsistency Leads to Auth Bypass
A string-vs-object handling mismatch can create surprising type confusion: apps that mutate assumed-object payloads before signing may be bypassed if untrusted input is a string that later verifies as an object.
https://hack.do/posts/node-jsonwebtoken-string-payload-auth-bypass/
Node.js Permission Bypass via WASI Module
Restrictions made with the –experimental-permission flag can be bypassed with the built-in wasi module
https://hack.do/posts/nodejs-wasi-permission-bypass/
Ghost CMS: Privilege Escalation via Post Preview
An underprivileged Ghost user can create a post with javascript, that when previewed by and admin will execute and elevate privileges.
https://hack.do/posts/ghost-code-injection-privilege-escalation/
Elmowned - Hacking Elmo
Build project for an IoT Elmo to prank my friend.
https://hack.do/posts/elmowned/