bug-bounty451
google354
xss338
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post86
csrf83
browser77
writeup75
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
docker51
ssrf51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
vulnerability-disclosure32
smart-contract-vulnerability32
clickjacking31
burp-suite31
info-disclosure31
race-condition31
web-application31
reverse-engineering31
wordpress30
input-validation30
web-security29
information-disclosure29
cloud29
reflected-xss29
solidity27
0
8/10
vulnerability
A multi-stage RCE vulnerability chain in DeskPro helpdesk software exploits insufficient access control on API endpoints to leak JWT secrets and enable admin authentication, followed by insecure deserialization in template editing to achieve remote code execution. The attack chain was demonstrated against Bitdefender's support portal.
remote-code-execution
rce
insecure-deserialization
access-control
privilege-escalation
api-security
jwt-bypass
helpdesk
deskpro
vulnerability-chain
twig-template
pop-gadgets
php
authentication-bypass
CVE-2020-11465
CVE-2020-11463
CVE-2020-11466
CVE-2020-11464
CVE-2020-11467
DeskPro
Bitdefender
Redforce Web Security
JWT
TWIG