unsafe-deserialization

2 articles
Sort: New Top Best
clear filter
0

A researcher discovered remote code execution in HubSpot's template engine by exploiting expression language injection in HubL, using reflection to access javax.script.ScriptEngineManager and the Nashorn JavaScript engine to execute arbitrary code. The vulnerability arose from unsafe method calls allowed in the Jinjava-based template parser, which permitted access to Java reflection APIs despite blocking direct access to Runtime and System classes.

HubSpot HubL Jinjava PortSwigger javax.script.ScriptEngineManager jdk.nashorn.api.scripting.NashornScriptEngine com.hubspot.content.hubl.context.TemplateContextRequest
betterhacker.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
bug-bounty

A critical remote code execution vulnerability was discovered in PayPal's manager.paypal.com through unsafe Java object deserialization in the 'oldFormData' parameter, exploitable via the Commons Collections gadget chain and ysoserial tool to execute arbitrary OS commands and access production databases. The vulnerability was reported in December 2015 and patched by PayPal's security team.

PayPal manager.paypal.com Michael Stepankin artsploit Chris Frohoff Gabriel Lawrence Mark Litchfield FoxGlove Security ysoserial Commons Collections
artsploit.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details