Does process injection through file on a low privilege user considered as a vulnerability

I found a way to cause a low privileged program in Program Files to run any binary I want.
I am doing it by changing a configuration file it reads, which I of course have an access to.
Is it considered as a vulnerability?
I think so becaus… Continue reading Does process injection through file on a low privilege user considered as a vulnerability

[SANS ISC] Python Shellcode Injection From JSON Data

I published the following diary on isc.sans.edu: “Python Shellcode Injection From JSON Data“: My hunting rules detected a niece piece of Python code. It’s interesting to see how the code is simple, not deeply obfuscated, and with a very low VT score: 2/56!. I see more and more malicious Python code

The post [SANS ISC] Python Shellcode Injection From JSON Data appeared first on /dev/random.

Continue reading [SANS ISC] Python Shellcode Injection From JSON Data

Is character restriction ever a safe mechanism against code injection / better than input sanitisation?

Many services still restrict the special characters allowed in passwords and similar with the argument that it prevents injection attacks. Now, there are many good arguments against this such as avoiding unnecessary obstructions, character… Continue reading Is character restriction ever a safe mechanism against code injection / better than input sanitisation?

What automated tools can be used to identify template injection? [closed]

I am looking for an automated tool to identify client-side and server-side template injection vulnerabilities in a Web application which uses AngularJS.
This type of vulnerability is not currently detected by the tooling I currently use. … Continue reading What automated tools can be used to identify template injection? [closed]