Slide 9
Slide 9 text
Exploit
• Read the documentation: really important step
• Security consideration, configuration env, extensions/plugins, built-in
methods, filters…
• Explore: What we have access to within the template exection env
• Expose self object, brute force variable names
• Attack: trying to exploit it
• Some classes can be used to trigger object creation, read/write files, privilege
escalation…
2017-02-22 Gérôme Dieu - owasp 2017 Workshop 9