Back to directory
WRITEUP #2518

Remote Code Execution via Prototype Pollution in Blitz.js

RCEPrototype pollution
byPaul Gerste
Program
Blitz.js
Published
Jul 12, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://blog.sonarsource.com/blitzjs-prototype-pollution/
RELATED WRITEUPS
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
RCETLD hacking

Built with ❤️ by Shubham Rawat