Back to directory
WRITEUP #970

How I got Two RCE at EPAM-Bounty Program

RCESAPDefault credentialsGroovy scripting
by@0xBaRtiTa(0xBartita)
Program
EPAM
Published
Jul 10, 2023
Added to HackDex
Jul 17, 2023
Read Full Writeuphttps://web.archive.org/web/20230710001307/https://0xbartita.medium.com/how-i-got-two-rce-at-epam-bounty-program-389eb9fc7938
RELATED WRITEUPS
Hidden in Plain Sight: Uncovering RCE on a Forgotten Axis2 Instance
RCEDefault credentials
3 ways to get Remote Code Execution in Kafka UI
RCEInsecure deserialization
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization

Built with ❤️ by Shubham Rawat