All Jupiter Broadcasting Shows cover image

Linux Action News 219

All Jupiter Broadcasting Shows

00:00

JVM Vulnerability

Attackers send malicious data with one of these look up values. Then if the server logs that data in a request, which is super common. That triggers the vulnerability log for ja. And because it's an attacker controlled server, well, the response from that server contains a path to a java class vial. Well, that gets down loaded and then injected into the running server process,. boom, remote code execution right there.

Play episode from 09:59
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app