In rare situations, web applications are design to accept code as input. In most case, it is design to provide flexibility to the administrator of a system. The idea is to replace a complex interface by a
Domain Specific Language. For a developper, it is a way to simply the application. For an attacker or a pentester, it could be the key element to gain access to the operating system.
|
Fictitious Applications |
The attack vectors describe in this blog post are based on two scenarios I came across earlier this year. For each of those scenarios, I will present the engines used and some malicious samples to exploit those.
If you are looking for contextualize scenario, you can look at
the follow article (Popping a shell on the Oculus Developer Portal). The attack described, in the previous article, take advantage of an expose
eval function on the Oculus Developer Portal.