Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Live Demo: Exploiting Apache Struts Vulnerabilities [Video]

DZone's Guide to

Live Demo: Exploiting Apache Struts Vulnerabilities [Video]

By now, you've probably heard about the Equifax hack. In this post, we take a look at what the root cause was and how to recreate it. The vector might surprise you.

· Security Zone
Free Resource

Discover an in-depth knowledge about the different kinds of iOS hacking tools and techniques with the free iOS Hacking Guide from Security Innovation.

Netsparker CEO, Ferruh Mavituna, and Security Researcher, Sven Morgenroth, joined Paul Asadoorian in episode #143 of Hack Naked News.

During the show, Ferruh discusses what causes could have led to the infamous Equifax hack and the data breach of hundreds of millions of records of cardholder data. Even though it was thought that a deserialization vulnerability in the REST plugin of Apache Struts was the main cause, an OGNL Expression Injection (CVE-2017-5638) published in March was the root cause for the breach. Therefore our Security Researcher, Sven, gave a live demo of how to find and exploit several OGNL expression vulnerabilities in Struts.

During the demo, Sven also used Netsparker Web Application Security Scanner to highlight how easy it is to automatically find these types of vulnerabilities when you use the correct tools. Watch the full Hack Naked News episode #143.

You can also skip directly to Ferruh’s discussion of the Equifax hack, and Sven’s explanation of OGNL Expression Injection vulnerabilities and how to identify and exploit them.

Learn about the importance of a strong culture of cybersecurity, and examine key activities for building – or improving – that culture within your organization.

Topics:
injection ,equifax ,security ,apache struts 2 ,vulnerabilities

Published at DZone with permission of Robert Abela, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}