Well, this one is a standard exploit. A system didn’t make sure you couldn’t do malicious things
Ex a website written in Java has a text box. You know this system is logging information using log4j. You put in some text that contains a script that can do some things. The web app logs what you wrote and then log4j not having a “don’t actually do anything with this script” boundary actually goes off and does the thing
There’s a few more levels in there but that’s the gist of it
Latest Answers