Remote Code Execution Deserialization Vulnerability Blocked by Contrast
On May 20, 2020, the National Vulnerability Database (NVD) published a new CVE—CVE-2020-9484. The vulnerability associated with CVE-2020-9484 allows any anonymous attacker with internet access to submit a malicious request to a Tomcat Server that has PersistentManager enabled using FileStore. This is not the default setup, but it can be ... Read More
Contrast Labs: CVE-2020-11444: Privilege Escalation Vulnerability in Sonatype Nexus Repository Manager
In this time of COVID-19, social distancing, stay at home, shelter in place, and all the other things that force us to really do nothing outside the home, I have spent more time bug hunting ... Read More
Contrast Labs: Mapping Risk Profiles for Select OWASP Top 10 Vulnerabilities to Understand Their AppSec Risk
At Contrast Security, the Contrast Labs team is charged with numerous things. Part of this charter includes looking at threat intelligence and understanding the true threat landscape. This encompasses risks that different vulnerabilities may pose to an organization. In my case, having spent nearly 20 years in application security (AppSec), ... Read More
Videoconferencing Is Being Weaponized, Tips on Making Your Meetings More Secure
Zoom, the videoconferencing application that has grown from 10 million users in December to over 200 million today (an increase of 1,900%), is easily the most popular virtual meeting service for businesses, nonprofits, schools, and social groups from all walks of life. It’s also the most downloaded app in the ... Read More
How I Made $600 in Bug Bounty in 15 Minutes with Contrast CE – CVE- 2019-8442
We live in a dynamic economy that is constantly developing new ways to generate revenue. An area that fascinates me are the bug bounty programs such as Atlassian on BugCrowd. Generating tangible rewards from these programs is not an easy undertaking. After years of participating in them, I can attest ... Read More
Public WiFi is actually still pretty dangerous
I wanted to write a short response to an article EFF posted, Why Public Wi-Fi is a Lot Safer Than You Think. It's no secret transport layer security has vastly improved over the years -- so I generally agree with a lot of the points made here. For the most ... Read More
Why You Need Both a WAF and RASP to Protect Your Web Applications
One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit on their laurels can find themselves in a position of never-ending catch up. For security operations and application security professionals who rely exclusively on web application firewalls (WAFs), this should ... Read More
Using Contrast to prevent the Weblogic Remote Code Execution (RCE) Deserialization Vulnerability – CVE-2019-2725
On April 17, 2019, Oracle released a Critical Patch Advisory with 254 patches. One of the vulnerabilities addressed was for CVE-2019-2725. The vulnerability associated with CVE-2019-2725 allows any anonymous attacker with internet access to submit a malicious request to the Oracle WebLogic Server component of Oracle Fusion Middleware that would ... Read More
Privilege Escalation in Popular Blogging Platform
Ghost is a popular open source blogging platform written in Node.js. It is downloaded around 8,500 times a week according to npm ... Read More

