Back to directory
WRITEUP #3100

How did I find Log4j vulnerability via Static Code Analysis and receive €€€ bounty?

RCELog4shell
by@Pranav_Gajjar_(Pranav Gajjar)
Program
-
Published
Jan 10, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://medium.com/@pranav-gajjar/how-did-i-find-log4j-vulnerability-via-static-code-analysis-and-received-bounty-94f4d86cea88
RELATED WRITEUPS
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
RCETLD hacking

Built with ❤️ by Shubham Rawat