|
You are here |
buer.haus | ||
| | | | |
positive.security
|
|
| | | | | Using a still unpatched vulnerability in the PHP library dompdf (used for rendering PDFs from HTML), we achieved RCE on a web server with merely a reflected XSS vulnerability as entry point. | |
| | | | |
spawnzii.github.io
|
|
| | | | | Introduction Hello, I'm currently a student at ESNA and I'm passionate about web application security. This article describes the discovery of several critical vulnerabilities in the SPIP CMS and Root-Me. With a friend (cc Abyss Watcher) we decided to search for vulnerabilities on the SPIP/Root-Me. From the first days, we managed to find some bugs, XSS, CSRF and later we will discover a RCE. Environment Of course we did not our research directly on root me. | |
| | | | |
blog.kotowicz.net
|
|
| | | | | A blog on security, malware, cryptography, pentesting, javascript, php and whatnots | |
| | | | |
machevalia.blog
|
|
| | | [AI summary] The article details a remote code execution vulnerability in a .tgz file upload feature, where the server's parsing logic allowed an attacker to bypass filters by crafting a malicious archive with a web shell. | ||