[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4B70B66DA655F144855183C68062EE89D41B7F@trexchange.csnc.ch>
Date: Wed, 14 Mar 2012 19:21:41 +0100
From: "Ivan Buetler" <ivan.buetler@...c.ch>
To: <bugtraq@...urityfocus.com>
Subject: Struts2 Security Challenge
Hi all,
We are proud to announce a new and free Apache Struts2 Web-Hacking
challenge. Ever thought about vulnerabilities in frameworks and
libraries one is using in its web app? Apache Struts is used in many web
apps around the globe. But the vulnerability and the impact is not very
known. That's why we have written a "vulnerable" service you can legally
mess around with. It is important to keep an eye on such components and
dependencies. Try to solve the struts challenge! (Level = Advanced)
Read more about the Struts2 problem here:
* http://struts.apache.org/2.x/docs/s2-009.html
Watch this Hacking-Lab intro movie and get familiar with our vulnerable
e-banking service and the challenge host. The exploit string is
obfuscated and hidden to make it more interesting for you.
* http://media.hacking-lab.com/movies/struts2/
Do you feel like little hands-on experience? No problem, register to our
free Hacking Challenge, connect to the lab using VPN and learn more
about exploitation and remedy. Get our free HL LiveCD and speed up your
connection to the lab.
* https://www.hacking-lab.com/events/registerform.html?eventid=199
Mitigation
It is strongly recommended to upgrade to Struts 2.3.1.2, which contains
the corrected OGNL and XWork library. Vulnerable apps are at high risk
(remote code execution).
Have a safe day
Ivan Buetler
Powered by blists - more mailing lists