gadget-chain

2 articles
Sort: New Top Best
clear filter
0
bug-bounty

A critical remote code execution vulnerability was discovered in PayPal's manager.paypal.com through unsafe Java object deserialization in the 'oldFormData' parameter, exploitable via the Commons Collections gadget chain and ysoserial tool to execute arbitrary OS commands and access production databases. The vulnerability was reported in December 2015 and patched by PayPal's security team.

PayPal manager.paypal.com Michael Stepankin artsploit Chris Frohoff Gabriel Lawrence Mark Litchfield FoxGlove Security ysoserial Commons Collections
artsploit.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 8/10

Researchers automated Java deserialization gadget chain discovery using LLM-driven analysis combined with static call graph analysis, discovering novel chains against WildFly and other application servers. The methodology uses WALA-based call graph construction, dynamic bytecode analysis for type confusion, and Claude Code to iteratively explore and validate gadget chains through a REST API query interface.

ysoserial GadgetInspector Claude Code IBM Watson Libraries for Analysis (WALA) CFR Java ASM FastAPI SQLite WildFly WebLogic WebSphere JBoss Jenkins OpenNMS Foxglove Security
atredis.com · Stephen Breen · 4 hours ago · details