8000 ch4n3-yoon (Seokchan Yoon) · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View ch4n3-yoon's full-sized avatar
:octocat:
:octocat:

Highlights

  • Pro

Organizations

@sullivanproject @TG-WinG

Block or report ch4n3-yoon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ch4n3-yoon/README.md

Profile

Work Experiences

  • Security Researcher @ Zellic.io (2025.04. - now)
  • [REDACTED] Researcher @ [REDACTED] Research Institute under Ministry of National Defense, Korea (2023.09. - 2025.03.)
  • Web Security Researcher @ STEALIEN (2020.07. - 2023.06.)

Achievements/Awards

2025

  • 2025 DEF CON CTF 33 Finalist (team: Cold Fusion)

2024

  • 2024 White Hat Contest Soldier Division
    (화이트햇 콘테스트) 1st Place, hosted by the Ministry of National Defense, Korea
    Awarded the Minister of National Defense Award (국방부 장관상)

2023

  • 2023 CODEGATE University Division
    Finalist, hosted by the Ministry of Science and ICT, Korea

2022

  • 2022 CODEGATE University Division
    Finalist, hosted by the Ministry of Science and ICT, Korea

  • 2022 Cyber Conflict Exercise (CCE) Public Institution Sector Division
    (사이버공격방어대회) 2nd Place, hosted by the National Intelligence Service, Korea
    Awarded the Director of National Security Research Institute Award (국가보안연구소장상)

  • 2022 HACKTHEON SEJONG National University Cybersecurity Competition
    6th Place, hosted by Sejong Special Self-Governing City, Korea
    Awarded the Director of National Security Research Institute Award (국가보안연구소장상)

2021

  • 2021 Cyber Conflict Exercise (CCE) Public Institution Sector Division
    (사이버공격방어대회) 2nd Place, hosted by the National Intelligence Service, Korea Awarded the Director of National Security Research Institute Award (국가보안연구소장상)

2019

  • 2019 Cyber Operations Challenge Student Division
    (사이버작전경연대회) 2nd Place, hosted by the Ministry of National Defense, Korea
    Awarded the Cyber Operations Commander Award (사이버작전사령관상)

2018

  • 2018 Cybersecurity Competition Individual Preliminary Round
    (정보보안경진대회) 1st Place, hosted by the Ministry of Education, Korea
    Awarded the President of Seoul Women's University Award (서울여자대학교 총장상)

  • 2018 Cybersecurity Competition Team Finals
    (정보보안경진대회) 1st Place, hosted by the Ministry of Education, Korea
    Awarded the Minister of Education Award (교육부 장관상)

2017

  • 2017 Cybersecurity Competition Team Finals
    (정보보안경진대회) 1st Place, hosted by the Korea Education and Research Information Service
    Awarded the Director of Korea Education and Research Information Service Award (한국교육학술정보원장상)

Disclosed Vulnerabilities

NAVER

  • NBB-1126, Stored XSS
  • NBB-1143, SQL Injection
  • NBB-1260, Stored XSS
  • NBB-2315, Reflected XSS
  • NBB-2316, Reflected XSS
  • NBB-2314, Reflected XSS

Python

  • CVE-2024-7592: Quadratic complexity parsing cookies with backslashes

Django

  • CVE-2023-36053: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator
  • CVE-2024-24680: Potential denial-of-service in intcomma template filter
  • CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
  • CVE-2024-21520: Cross-Site Scripting (XSS) in browserable API of django-rest-framework
  • CVE-2024-41991: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget
  • CVE-2024-53908 : Potential SQL injection in HasKey(lhs, rhs) on Oracle

Apache Airflow

  • CVE-2024-39877: Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler
  • CVE-2024-39863: Apache Airflow: Potential XSS Vulnerability
  • CVE-2024-45034: Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes

Ruby

  • CVE-2024-41123: DoS vulnerabilities in REXML

Ruby on Rails

  • CVE-2024-47887: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
  • CVE-2024-41128: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch

Java Spring

  • CVE-2024-38809: Spring Framework DoS via conditional HTTP request

Media / Presentations

2020

2021

2022

2023

  • <Django 1-day Vulnerability Analysis> (@HackingCamp 26th 🇰🇷)
    • I analyzed and shared disclosed vulnerabilities with high severity to Django Project, 2022
    • Reference: http://hackingcamp.org/
  • <Django Framework N-day Vulnerability Analysis & Secure Coding Guide> (@CODEGATE 2023 🇰🇷)

2024

Pinned Loading

  1. encode/django-rest-framework encode/django-rest-framework Public

    Web APIs for Django. 🎸

    Python 29.1k 6.9k

  2. rails/rails-html-sanitizer rails/rails-html-sanitizer Public

    Ruby 319 85

  3. ruby/rexml ruby/rexml Public

    REXML is an XML toolkit for Ruby

    Ruby 150 76

  4. dimigo-Couple-Searching dimigo-Couple-Searching Public

    디미고 커플 탐지 프로그램

    Python 42 4

  5. write-ups write-ups Public

    해킹대회 및 워게임 문제 풀이

    Python 5 1

  6. Chrome-Dino-with-Body-Language Chrome-Dino-with-Body-Language Public

    2020-1H 경희대학교 웹파이선프로그래밍 텀프로젝트

    HTML 4

0