From cb26f3284cddd093edc55d0ab07a8c93187fa6e4 Mon Sep 17 00:00:00 2001 From: Ted Date: Mon, 26 Feb 2024 13:49:19 +0800 Subject: [PATCH] Temporarily re-enable Strapi writeup --- content/posts/strapi-rce-writeup.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/posts/strapi-rce-writeup.md b/content/posts/strapi-rce-writeup.md index 686edd1..ca6a669 100644 --- a/content/posts/strapi-rce-writeup.md +++ b/content/posts/strapi-rce-writeup.md @@ -2,7 +2,7 @@ title: "Remote code execution in a billion-dollar publicly traded company" date: 2024-02-10T21:43:57+08:00 author: ted -draft: true +draft: false --- There are 4 things that have to happen in order to find [CVE-2023-22621](https://nvd.nist.gov/vuln/detail/CVE-2023-22621) in the wild: @@ -114,4 +114,4 @@ Once that's done, I took my time to write a detailed vulnerability report and su ![Strapi RCE triage](/strapi-rce-triage.jpg) -Now that's how I compromised a server of a company worth more than a billion dollars. \ No newline at end of file +Now that's how I compromised a server of a company worth more than a billion dollars.