Security log

2022

Web lib

Identify data leak (personnal details + partial credit card details) on wrongly implemented (and badly secured) websites using the payzen lib.

Web CTM

Identify a debug plugin activated that can provide database credentials when exception is generated

App Carrefour Martinique

Identify an unsolved data leak that can allow a person to use the reward of another person

2021

Web CTM

Identify an SQL injection vulnerable service and multiple information exposure.

Web CTM

Identify an SQL injection vulnerable service.

Web Cesecem

Identify an accessible installation plugin page that could allow to insert external content on an institutional website.

Web TousAntiPass

Identify two leaks of personal data that allow to retrieve the user database through simple pagination (completely in the first case, partially in the second case).

Org CTM

Identify a deprecated (but still used) domain not renewed. PoC (traffic + email catchall) that domain acquisition could create confidentiality, privacy and security issues. Domain is being transfered back to CTM.

2020

Web, Orange

Identify the leak of personal data through dorking.

Web, SFR Caraibes

Identify the leak of personal data when, while being loggued, through a modified query to a webservice. Found a sha1 password sent on the account page. Confirmed and solved.

Web, Odyssi

Identify the leak of personal data when, unlogged, through a modified query to a webservice. Confirmed and solved.

Web/Internet gateway, SFR

Report 6 vulnerabilities (at least 1 already reported) on the SFR gateway. Reviewed, asked to test the next beta version.

2019

Web, espace sud

Report the installation of a variant of the malware crypper on their website. Confirmed and solved.

App, Carrefour Martinique

Identify that the fidelity customer QR Code is an ID. Report shows it is possible to generate an ID, use it at the point of sale and 1. uses the credit associated to that user to pay for groceries, 2. obtain personal data on that user. Confirmed and solved.