TANTO DOJO BLOG

Grav-ity of the situation: Unauthenticated Access to RCE in Grav CMS

In this blog post, critical security vulnerabilities discovered in Grav CMS are explored. Two out of four issues I reported have been assigned CVE-2024-27921 and CVE-2024-34082. By exploiting a combination of these vulnerabilities, an unauthenticated attacker can escalate privileges and execute code on the server. This blog post details how a manual source code review was performed to uncover these vulnerabilities, explaining their mechanisms and potential impact.

One Shell To Rule Them All

The reverse shell is a staple technique in the offensive security industry. The ability to convert a remote code execution vulnerability into a fully fledged interactive session is endlessly useful for enumeration, privilege escalation, and pivoting.

In this article I propose a new tool oneshell to solve some of the problems with existing tooling.

CVE-2024-27292: docAssembling exploits for RCE

This post examines CVE-2024-27292 in Docassemble, revealing an unauthenticated path traversal flaw that exposes sensitive files and secrets, leading to privilege escalation and template injection, enabling remote code execution. It details the vulnerability, its impact, and the exploitation steps.

Judge0 Sandbox Escape

Judge0 is an open source service used to run arbitrary code inside a secure sandbox. The Judge0 website lists 23 clients using the service, with more than 300 self hosted instances available on the public internet and potentially many more within internal networks.

Tanto Security disclosed vulnerabilities in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. These vulnerabilities were assigned CVE-2024-29021, CVE-2024-28185 and CVE-2024-28189.

CVE-2022-41343 - RCE via Phar Deserialisation

Dompdf is a popular library in PHP used for rendering PDF files from HTML. Tanto Security disclosed a vulnerability in Dompdf affecting version 2.0.0 and below. The vulnerability was patched in Dompdf v2.0.1. We recommend all Dompdf users update to the latest version as soon as possible. Exploitation of the vulnerability results in remote code execution subject to the following conditions. The application is deployed on PHP <= 7.x and a well-known RCE deserialization gadget exists in any of the applications library’s.

Let our seasoned experts sharpen your cyber security. Call 1300 1 TANTO 82686 or send us a message.

CONTACT Let’s talk

Please include a little about the service you are after and what you need done. We will work with you to achieve the desired result.

Level 4, 350 Collins Street
MELBOURNE VIC
3000 AUSTRALIA

Level 1, 234 George Street
SYDNEY NSW
2000 AUSTRALIA

Please include a little about the service you are after and what you need done. We will work with you to achieve the desired result.

Read terms & conditions

Protected by reCAPTCHAv3

Protected by reCAPTCHAv3