Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Live Demo: Exploiting Apache Struts Vulnerabilities [Video]

DZone's Guide to

Live Demo: Exploiting Apache Struts Vulnerabilities [Video]

By now, you've probably heard about the Equifax hack. In this post, we take a look at what the root cause was and how to recreate it. The vector might surprise you.

· Security Zone ·
Free Resource

Protect your applications against today's increasingly sophisticated threat landscape.

Netsparker CEO, Ferruh Mavituna, and Security Researcher, Sven Morgenroth, joined Paul Asadoorian in episode #143 of Hack Naked News.

During the show, Ferruh discusses what causes could have led to the infamous Equifax hack and the data breach of hundreds of millions of records of cardholder data. Even though it was thought that a deserialization vulnerability in the REST plugin of Apache Struts was the main cause, an OGNL Expression Injection (CVE-2017-5638) published in March was the root cause for the breach. Therefore our Security Researcher, Sven, gave a live demo of how to find and exploit several OGNL expression vulnerabilities in Struts.

During the demo, Sven also used Netsparker Web Application Security Scanner to highlight how easy it is to automatically find these types of vulnerabilities when you use the correct tools. Watch the full Hack Naked News episode #143.

You can also skip directly to Ferruh’s discussion of the Equifax hack, and Sven’s explanation of OGNL Expression Injection vulnerabilities and how to identify and exploit them.

Rapidly detect security vulnerabilities in your web, mobile and desktop applications with IBM Application Security on Cloud. Register Now

Topics:
injection ,equifax ,security ,apache struts 2 ,vulnerabilities

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}