[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [FD] ImpressCMS: from unauthenticated SQL injection to RCE
From:       Egidio Romano <n0b0d13s () gmail ! com>
Date:       2022-03-26 1:31:15
Message-ID: CAJeQoQdQLyL-91EpLCfRD+zMMda5hXgZhEP28KNLhkiBBHT2dQ () mail ! gmail ! com
[Download RAW message or body]

Hello again,

Just wanted to let you know I updated the blog post with some more details:
apparently, this technique could be abused to bypass WAFs such as OWASP
ModSecurity CRS (Paranoia Level 1) and Cloudflare, check it out!

/EgiX

On Wed, Mar 23, 2022 at 3:07 PM Egidio Romano <research@karmainsecurity.com>
wrote:

> Hello list,
>
> I'd like to share with you my latest blog post. Hope you may find this
> SQL injection exploitation technique interesting and potentially useful
> for your penetration tests. Enjoy it!
>
> Link:
> http://karmainsecurity.com/impresscms-from-unauthenticated-sqli-to-rce
>
> Best regards,
> /EgiX
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: https://seclists.org/fulldisclosure/
>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic