@fransrosen
Web based format injection,
dumping memory like it's 99
or "Please help"
Slide 2
Slide 2 text
@fransrosen
Public Bug Bounty
Slide 3
Slide 3 text
@fransrosen
RCE is 30,000 USD
Slide 4
Slide 4 text
@fransrosen
Methodology
• Found a domain not like the other ones
Slide 5
Slide 5 text
@fransrosen
Methodology
• Found a domain not like the other ones
• Legacy on-premise PHP-app acquired by a huge tech organization
Slide 6
Slide 6 text
@fransrosen
Methodology
• Found a domain not like the other ones
• Legacy on-premise PHP-app acquired by a huge tech organization
• Old API-endpoints still available
Slide 7
Slide 7 text
@fransrosen
Methodology
• Found a domain not like the other ones
• Legacy on-premise PHP-app acquired by a huge tech organization
• Old API-endpoints still available
👍 👍 👍
Slide 8
Slide 8 text
@fransrosen
Methodology
• Google + GitHub etc
Slide 9
Slide 9 text
@fransrosen
Methodology
• Google + GitHub etc
Slide 10
Slide 10 text
@fransrosen
Methodology
• Google + GitHub etc
Slide 11
Slide 11 text
@fransrosen
Methodology
• Google + GitHub etc
Slide 12
Slide 12 text
@fransrosen
Methodology
• Google + GitHub etc
• wfuzz!
@fransrosen
We can read all ENVs
for i in $(seq 8460 8550); do
res=$(curl -s -X POST -H 'Content-Type: text/xml; charset="UTF-8"'
\—data-binary \
’
]>
'
Slide 56
Slide 56 text
@fransrosen
We can read all ENVs
for i in $(seq 8460 8550); do
res=$(curl -s -X POST -H 'Content-Type: text/xml; charset="UTF-8"'
\—data-binary \
’
]>
'
Slide 57
Slide 57 text
@fransrosen
Response
"We are unable to see anything sensitive in the response.
If you believe you have found sensitive information please provide this to us."
Slide 58
Slide 58 text
@fransrosen
Response
"We are unable to see anything sensitive in the response.
If you believe you have found sensitive information please provide this to us."
Slide 59
Slide 59 text
@fransrosen
Response
"We are unable to see anything sensitive in the response.
If you believe you have found sensitive information please provide this to us."