Главная
Study mode:
on
1
Introduction
2
About me
3
What is WordPress
4
Installing Plugins
5
Overview
6
Background
7
Medicals
8
Custom Prepared Statements
9
Exploit Technique 1
10
Exploit Technique 2 Demonstration
11
WordPress Patch
12
Second Exploit Technique
13
Recap
14
Exploit 2 WooCommerce
15
Exploit 6 Wordpress
16
Closing Words
17
Question
18
How it works
19
What the attacker does
20
WordPress version
21
Advice to plugin authors
22
Will there be a prepared statement
23
Is there a safe way to use that caching technique
24
How have you found the experience working with different plugin teams
Description:
Explore novel exploitation techniques in WordPress through this conference talk from OWASP AppSec EU 2018. Delve into a fundamental design flaw in the WordPress core that led to severe security issues, including SQL injection vulnerabilities and a new type of PHP object injection. Examine how a custom design of prepared statements contributed to these vulnerabilities. Analyze the characteristics of this specific occurrence and learn how to identify similar issues in other PHP projects. Gain insights into new and generic exploitation techniques, as well as guidance for WordPress and other developers on preventing these security problems. Understand the implications of WordPress's wide adoption, its reliance on legacy code, and the challenges of implementing modern best practices. Learn about the exploitation of outdated cores and plugins, and the ongoing efforts to secure the platform despite the intrinsic features of the PHP language.

Novel Exploitation Techniques in WordPress - Prepared Statements and Object Injection

OWASP Foundation
Add to list
0:00 / 0:00