Live Demo: Exploiting Apache Struts Vulnerabilities [Video]
By now, you've probably heard about the Equifax hack. In this post, we take a look at what the root cause was and how to recreate it. The vector might surprise you.
Join the DZone community and get the full member experience.Join For Free
Netsparker CEO, Ferruh Mavituna, and Security Researcher, Sven Morgenroth, joined Paul Asadoorian in episode #143 of Hack Naked News.
During the show, Ferruh discusses what causes could have led to the infamous Equifax hack and the data breach of hundreds of millions of records of cardholder data. Even though it was thought that a deserialization vulnerability in the REST plugin of Apache Struts was the main cause, an OGNL Expression Injection (CVE-2017-5638) published in March was the root cause for the breach. Therefore our Security Researcher, Sven, gave a live demo of how to find and exploit several OGNL expression vulnerabilities in Struts.
During the demo, Sven also used Netsparker Web Application Security Scanner to highlight how easy it is to automatically find these types of vulnerabilities when you use the correct tools. Watch the full Hack Naked News episode #143.
You can also skip directly to Ferruh’s discussion of the Equifax hack, and Sven’s explanation of OGNL Expression Injection vulnerabilities and how to identify and exploit them.
Published at DZone with permission of Robert Abela, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.