Ransack Query Injection: Analysis and Exploitation of an ORM Vulnerability Developers often rely on libraries to manage communications with databases. This saves them from having to write raw queries. These libraries generall... 03.02 Applications
Black Box Exploitation of a Deserialisation Vulnerability Deserialisation vulnerabilities are often difficult to exploit. In most cases, you need access to the source code to identify the available classes or... 03.07 Applications
Insecure Authentication Tokens leading to Account Takeover Most applications have a critical feature for identifying users. The aim is to guarantee the confidentiality and integrity of their data. Common metho... 18.09 Applications
Exploiting an LFI (Local File Inclusion) Vulnerability and Security Tips When we visit a website, it is common to be able to browse different pages. Each page can be represented by a file on the server. In order to determin... 07.08 Applications
White box audit of a CI/CD pipeline on AWS Recently, one of our clients asked us to review their Continuous Integration and Continuous Deployment (CI/CD) pipeline, deployed on an AWS infrastruc... 18.04 Cloud
Exploiting an HTML injection with dangling markup During a web application penetration test, we came across the following situation: 21.02 Applications
Exploiting a broken access control vulnerability on GraphQL During a web application penetration test, we discovered a vulnerability related to the configuration and mismanagement of access controls on GraphQL.... 26.01 Applications
Exploiting an SQL injection with WAF bypass Discovering an SQL injection with burp’s scanner During a penetration test, we came across this situation: 13.12 Applications
Auditing an application protected by a CSRF token with Stepper Introduction The CSRF token is a protection that requires the insertion of a random and dynamic value in a request. This value is then analysed by the... 29.08 Applications
RCE vulnerability in a file name During our security audits, we are regularly confronted with vulnerabilities that allow commands to be executed on a system. These can take various fo... 17.03 Applications