Well done, sir! Thanks for sharing. This can easily be used in order to increase the security awareness and as an eye-catcher as part of any security training. Much appreciated. :)
-
-
-
Thank you! Hope it helped point out further how dev tools need to be secured properly; found this RCE in the wild.
Kraj razgovora
Novi razgovor -
-
-
Eugene is my hero
- Kraj razgovora
Novi razgovor -
-
-
Thanks for the write up. A few additional thoughts from my side: * solutions like inlets invite people to expose their unhardened dev service to the internet (https://github.com/inlets/inlets#intro …) * someone may find spring boot applications wih i.e. beanstack https://beanstack.io/
-
* I wrote a poc about combining a path traversal with rping boot actuators https://github.com/ramshazar/orangetsai-springboot-actuator-poc … After finding the exposed endpoints one might be able to exploit them with your poc
- Još 1 odgovor
Novi razgovor -
-
-
J2EE Scan Burp extension makes it really easy to find Spring Boot Actuators as well. Good stuff man!
-
Thanks, will look into adding it into my extensions :)
- Još 1 odgovor
Novi razgovor -
-
-
Cool stuff
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
@mthbernardes viu que o cara mencionou seu post? Show mano!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
