jmx-console

1 article
sort: new top best
clear filter
0 5/10

Researcher discovered a deserialization vulnerability in a JSF-based web application by identifying unencrypted serialized Java objects in the javax.faces.ViewState parameter, leading to remote code execution via JMX console exploitation and a $1500 bounty reward.

Ashish Kunwar Jexboss BugCrowd Prototype 1.6.1 JBoss JSF MyFaces
medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details