SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
On 10th of August, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Maximilian Günther, researcher at the University of Vienna, gave a talk on “Silent Signals: Exploiting Security and Privacy Side-Channels in End-to-End Encrypted Messengers” at the… Read More
We are incredibly proud of the Austrian hacking team KuK Hofhackerei, which secured 9th place at DEF CON CTF 33, one of the toughest and most renowned Capture the Flag competitions in the world. The DEF CON Capture the Flag competition is… Read More
On a warm summer evening end of July, the SBA Research employees and alumni came together for our annual SBA BBQ – a tradition that brings colleagues, friends, and former team members together in a relaxed and welcoming atmosphere. The event offered the perfect opportunity to reconnect with alumni, share… Read More
In June, our colleague Bernhard Garn, senior researcher at SBA Research, participated in the 2nd IRDR Young Scientists Lumos, a global pre-event to the 2025 Global Platform for Disaster Risk Reduction (GPDRR). Co-hosted by the Integrated Research on Disaster Risk (IRDR) and the… Read More
We are proud to announce that this year, three members of SBA Research have been recognized for their outstanding contributions! Each year, the University of Vienna honors exceptional accomplishments by affiliated researchers through its “Best of the Best” awards. The recognition focuses on two main categories:… Read More
Vulnerability Overview All user accounts authenticate towards a Filebrowser instance with a password. A missing password policy and brute-force protection makes it impossible for administrators to properly secure the authentication process. Recommended Countermeasure We recommend to update to Filebrowser version 2.34.1 or later and configure… Read More
Vulnerability Overview Files managed by Filebrowser can be shared with a link to external persons. While the application allows protecting those links with a password, the implementation is error-prone, making an incidental unprotected sharing of a file possible. Recommended Countermeasure We recommend to update to… Read More
Vulnerability Overview The Command Execution feature of Filebrowser only allows the execution of shell commands which have been predefined on a user-specific allowlist. The implementation of this allowlist is erroneous, allowing a user to execute additional commands not permitted. Recommended Countermeasure We recommend to update… Read More
Vulnerability Overview In the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access… Read More
Vulnerability Overview The Command Execution feature of Filebrowser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. Recommended Countermeasure We recommend to disable the… Read More
We are proud to announce that we joined the Linux Foundation Europe, further strengthening our role within the international open-source community. With this step, we are reinforcing our commitment to advancing security and resilience in digital infrastructures. ... ∞