
Linux Action News 219
All Jupiter Broadcasting Shows
00:00
JVM Vulnerability
Attackers send malicious data with one of these look up values. Then if the server logs that data in a request, which is super common. That triggers the vulnerability log for ja. And because it's an attacker controlled server, well, the response from that server contains a path to a java class vial. Well, that gets down loaded and then injected into the running server process,. boom, remote code execution right there.
Play episode from 09:59
Transcript


