JndiManager).
Showing posts with label exploitation. Show all posts
Showing posts with label exploitation. Show all posts
Tuesday, December 21, 2021
TOCTOU Vulnerability in Log4J 2.15
Log4J has been in the spotlight for the past two weeks for a new attack vector which relies on Java Naming and Directory Interface (JNDI). In this blog, we will detail the new mitigation introduced in 2.15 and the bypass we found using a Time of Check, Time of Use vulnerability (TOCTOU). This vector was also discovered independently by Alvaro Muñoz and Tony Torralba. It is likely that many other individuals have reported related bypass techniques because there were multiple weaknesses in the same Java class (
Labels:
bypass,
exploitation,
java,
jndi,
log4j
Tuesday, July 16, 2019
Automating local DTD discovery for XXE exploitation
Last month, we presented at Hack In Paris (France) a XML External Entities (XXE) exploitation workshop. It showcase methods to exploit XXE with numerous obstacles. Today, we present our method to exploit XXEs with a local Document Type Declaration (DTD) file. More specifically, how we built a huge list of reusable DTD files.
Subscribe to:
Comments (Atom)
