Catalin Filip

Security Researcher Pentest-Tools.com

BIOGRAPHY

Cyber Security Enthusiast

How we analyzed and built an exploit PoC for CVE-2022-24086, a Magento RCE

Once a critical vulnerability in widely used software emerges, the race for an exploit PoC starts. Sometimes, an exploit pops up right away, but other times a high-risk CVE can live on in unpatched technologies for months, years even – which adversaries know full well.

That’s why CVE-2022-24086 caught our eye: because we saw an opportunity to build an exploit PoC before bad actors do, and persuade Magento shop owners to patch before they expose customers and themselves.

Through our analysis, we identified where in code the vulnerability exists starting from the available patch. We also managed to trigger RCE from the user input, which goes through the vulnerable code and that can be exploited to execute arbitrary code. All this without an existing exploit proof of concept.

After identifying a server side template injection, we started unpacking the vulnerability, discovering several “magic” functions in the process. These functions allowed us to successfully use STTI payloads and build our way to partial and then full control by triggering Remote Code Execution. In our presentation, we go through each step of our analysis and the thinking behind them to explain how a persistent adversary can manipulate this vulnerability to capture sensitive customer information and achieve persistence in the compromised system.

We also share a working exploit PoC for this, albeit patched, vulnerability and encourage pentesters and other infosec specialists tasked with security testing to include it in their work.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Mihail Plesa

Security Software Engineer Special Telecommunications Service

Max van der Horst

Security Specialist NorthWave

Rares Bratean

Senior Threat Intelligence Analyst Signify

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business

Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. 

In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.

PLATINUM PARTNERS

GOLD PARTNERS

defcamp 2022 booking holdings

SILVER PARTNERS

BRONZE PARTNERS

               

HACKING VILLAGE PARTNERS

EXHIBITORS

VIP LOUNGE POWERED BY

COMMUNITY & MEDIA PARTNERS