positive.security/blog/ransack-data-exfiltration

Preview meta tags from the positive.security website.

Linked Hostnames

3

Thumbnail

Search Engine Appearance

Google

https://positive.security/blog/ransack-data-exfiltration

Ransacking your password reset tokens | Positive Security

We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.



Bing

Ransacking your password reset tokens | Positive Security

https://positive.security/blog/ransack-data-exfiltration

We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.



DuckDuckGo

https://positive.security/blog/ransack-data-exfiltration

Ransacking your password reset tokens | Positive Security

We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.

  • General Meta Tags

    7
    • title
      Ransacking your password reset tokens | Positive Security
    • charset
      utf-8
    • description
      We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.
    • twitter:title
      Ransacking your password reset tokens | Positive Security
    • twitter:description
      We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.
  • Open Graph Meta Tags

    4
    • og:title
      Ransacking your password reset tokens | Positive Security
    • og:description
      We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.
    • og:image
      https://cdn.prod.website-files.com/5f6498c074436c349716e747/63ceda8f7b5b98d68365bdee_ransack_bruteforce_overview.png
    • og:type
      website
  • Twitter Meta Tags

    1
    • twitter:card
      summary_large_image
  • Link Tags

    7
    • alternate
      rss.xml
    • apple-touch-icon
      https://cdn.prod.website-files.com/5f6498c074436c50c016e745/5f7dd71edeeceb5d47162386_256_256.png
    • preconnect
      https://fonts.googleapis.com
    • preconnect
      https://fonts.gstatic.com
    • shortcut icon
      https://cdn.prod.website-files.com/5f6498c074436c50c016e745/5f7ddb13deeceb266b162f8d_favicon-32x32_white.png

Emails

1

Links

9