A Journey From JNDI/LDAP Manipulation to Remote Code Execution Dream Land

by Alvaro Munoz, Oleksandr Mirosh
Sept. 14, 2017 1 comment www.blackhat.com belen_caty Pen Testing & Audits jndi ldap

This talk will present a new type of vulnerability named "JNDI Reference Injection" found on malware samples attacking Java Applets (CVE-2015-4902). The same principles can be applied to attack web applications running JNDI lookups on names controlled by attackers. As we will demo during the talk, attackers will be able to use different techniques to run arbitrary code on the server performing JNDI lookups.


Steven Ulm 5 months, 4 weeks ago

Very useful presentation! Thank you Alvaro and Oleksandr for uploading it to SecurityDocs!