rce

106 articles
Sort: New Top Best
clear filter
0
jngiam.bearblog.dev · jngiam1 · 47 minutes ago · details · hn
0
overtoncollective.com · Ali_Jiwani · 52 minutes ago · details · hn
0
shahjerry33.medium.com · kh4sh3i/bug-bounty-writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rcesecurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A researcher discovered a critical RCE vulnerability in Sucuri's server-side scanner caused by explicitly disabled SSL certificate verification (CURLOPT_SSL_VERIFYPEER=false), allowing MiTM attackers to inject arbitrary PHP code. The disclosure reveals how Sucuri mishandled the bug bounty report, downplaying the severity despite the researcher proposing multiple remediation options.

Sucuri HackerOne Julien Ahrens CURLOPT_SSL_VERIFYPEER NSA Google PCI DSS
rcesecurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
vulnerability
rahulr.in · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A researcher discovered remote code execution in HubSpot's template engine by exploiting expression language injection in HubL, using reflection to access javax.script.ScriptEngineManager and the Nashorn JavaScript engine to execute arbitrary code. The vulnerability arose from unsafe method calls allowed in the Jinjava-based template parser, which permitted access to Java reflection APIs despite blocking direct access to Runtime and System classes.

HubSpot HubL Jinjava PortSwigger javax.script.ScriptEngineManager jdk.nashorn.api.scripting.NashornScriptEngine com.hubspot.content.hubl.context.TemplateContextRequest
betterhacker.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
vulnerability

Article discussing two remote code execution vulnerabilities in Microsoft SharePoint. The content appears to be a blog index or archive page listing various security research posts by the author.

Soroush Dalili SharePoint
soroush.secproject.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
vulnerability
rce
slashcrypto.org · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
rhys.io · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
vulnerability

A path traversal vulnerability in GitHub Desktop's x-github-client:// URI scheme handler allowed arbitrary code execution on macOS by opening malicious application bundles from a cloned repository without user interaction or Gatekeeper validation. The vulnerability was patched in GitHub Desktop v1.3.4.

GitHub Desktop H1-702 HackerOne 0xacb zhuowei CVE-2018-1000559 github-desktop-poc
pwning.re · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A DevOps engineer discovered unauthenticated remote code execution as root on exposed Marathon instances by leveraging the task scheduling API to execute arbitrary commands. The vulnerability exploits the lack of authentication on Marathon's HTTP interface combined with the platform's ability to execute arbitrary bash commands through scheduled tasks.

@omespino Marathon Mesos DC/OS Mesosphere Shodan
omespino.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A researcher discovered an RCE vulnerability on ASUS's RMA portal by bypassing front-end file upload restrictions and uploading an ASP webshell to the predictable /uploads directory on Microsoft-IIS 8.5. The vulnerability was disclosed responsibly and eventually patched, though ASUS's response was slow and the researcher reported poor communication from the vendor.

ASUS rma.asus-europe.eu Mustafa Kemal Can Microsoft-IIS 8.5 [email protected]
mustafakemalcan.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
vulnerability
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

Assetnote discovered and demonstrated a zero-day remote code execution vulnerability affecting Mozilla's AWS network infrastructure. The article appears to be a landing page for Assetnote's security research capabilities rather than detailed technical analysis.

Mozilla AWS Assetnote Searchlight Cyber
blog.assetnote.io · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
rce
blog.usejournal.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A researcher discovered a zero-day Server-Side Template Injection (SSTI) vulnerability in the Handlebars template engine used in Shopify's Return Magic app, achieving Remote Code Execution by exploiting Object.prototype methods and the Function constructor to bypass sandbox restrictions. The exploit leverages the 'with' helper and Object.prototype.defineProperty() to inject arbitrary code through email workflow templates.

Handlebars Shopify Return Magic HackerOne H1-514 Synack TrendMicro Matias
mahmoudsec.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

Two vulnerabilities discovered in Magento allowing remote code execution and local file read with low-privilege admin accounts: the first exploits path traversal in product design layout XML to execute arbitrary PHP code via custom product option file uploads, and the second leverages path traversal in email template CSS directives to read arbitrary files.

Magento Adobe Experience Cloud Magento 2.3.0 Magento 2.2.7 Magento 2.1.16 SCRT Team Magento\Framework\View\Element\Template Magento\Backend\Block\Template
blog.scrt.ch · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
More