A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
}
}
],
"id": "https://neos.social/users/renereh1/statuses/111957266338448642",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-02-19T08:45:11Z",
"url": "https://neos.social/@renereh1/111957266338448642",
"attributedTo": "https://neos.social/users/renereh1",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://neos.social/users/renereh1/followers"
],
"sensitive": false,
"atomUri": "https://neos.social/users/renereh1/statuses/111957266338448642",
"inReplyToAtomUri": null,
"conversation": "tag:neos.social,2024-02-19:objectId=1433880:objectType=Conversation",
"content": "<p>🚨 Ich konnte mehrere Sicherheitslücken in ILIAS 7, 8 und 9 (Beta) identifizieren. Zusammengefasst handelt es sich um um mehrere "Cross Site Scripting" Sicherheitslücken, einer "Local File Inclusion" und einer "Remote Code Execution", welche in Kombination mit einer weiteren "Arbitrary File Deletion" Sicherheitslücke durchgeführt werden konnte.</p><p>🛡️ Update now!</p><p>✅ Fixed Versions: 8.9, 7.28</p><p>📄 Details:<br /><a href=\"https://rehmeinfosec.de/labor/remote-code-execution-and-bypassing-htaccess-rule-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/remote-c</span><span class=\"invisible\">ode-execution-and-bypassing-htaccess-rule-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/arbitrary-file-deletion-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/arbitrar</span><span class=\"invisible\">y-file-deletion-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/local-file-inclusion-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/local-fi</span><span class=\"invisible\">le-inclusion-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/multiple-cross-site-scipting-xss-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/multiple</span><span class=\"invisible\">-cross-site-scipting-xss-in-ilias-elearning-platform</span></a></p>",
"contentMap": {
"de": "<p>🚨 Ich konnte mehrere Sicherheitslücken in ILIAS 7, 8 und 9 (Beta) identifizieren. Zusammengefasst handelt es sich um um mehrere "Cross Site Scripting" Sicherheitslücken, einer "Local File Inclusion" und einer "Remote Code Execution", welche in Kombination mit einer weiteren "Arbitrary File Deletion" Sicherheitslücke durchgeführt werden konnte.</p><p>🛡️ Update now!</p><p>✅ Fixed Versions: 8.9, 7.28</p><p>📄 Details:<br /><a href=\"https://rehmeinfosec.de/labor/remote-code-execution-and-bypassing-htaccess-rule-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/remote-c</span><span class=\"invisible\">ode-execution-and-bypassing-htaccess-rule-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/arbitrary-file-deletion-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/arbitrar</span><span class=\"invisible\">y-file-deletion-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/local-file-inclusion-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/local-fi</span><span class=\"invisible\">le-inclusion-in-ilias-elearning-platform</span></a><br /><a href=\"https://rehmeinfosec.de/labor/multiple-cross-site-scipting-xss-in-ilias-elearning-platform\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">rehmeinfosec.de/labor/multiple</span><span class=\"invisible\">-cross-site-scipting-xss-in-ilias-elearning-platform</span></a></p>"
},
"updated": "2024-02-19T08:58:56Z",
"attachment": [
{
"type": "Document",
"mediaType": "video/mp4",
"url": "https://cdn.masto.host/neossocial/media_attachments/files/111/957/320/024/237/697/original/9805dce561900300.mp4",
"name": null,
"blurhash": "U25;dm8zbX%gK%,[Ndoz=fKOw|jvBn-COFWV",
"width": 2784,
"height": 1746
}
],
"tag": [],
"replies": {
"id": "https://neos.social/users/renereh1/statuses/111957266338448642/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://neos.social/users/renereh1/statuses/111957266338448642/replies?only_other_accounts=true&page=true",
"partOf": "https://neos.social/users/renereh1/statuses/111957266338448642/replies",
"items": []
}
},
"likes": {
"id": "https://neos.social/users/renereh1/statuses/111957266338448642/likes",
"type": "Collection",
"totalItems": 7
},
"shares": {
"id": "https://neos.social/users/renereh1/statuses/111957266338448642/shares",
"type": "Collection",
"totalItems": 1
}
}