[LICH-SEC]
[リッチ-セク]
← Back|$cat /research/web-application-exploits.txt

>> WEB APPLICATION EXPLOITS

Real-world web application exploitation techniques and attack chains. Learn advanced SQL injection, XXE, SSRF, template injection (SSTI), deserialization attacks, and modern framework vulnerabilities. Practical exploitation of complex web application security flaws with complete walkthroughs.

[TOPIC]

Fortigate Bypass

During a security assessment, we identified and exploited CVE-2024-5591, a critical authentication bypass vulnerability affecting FortiOS devices. This write-up demonstrates how an unauthenticated attacker can gain administrative access to FortiGate firewalls, create unauthorized user accounts, and pivot into internal network infrastructure.

Published:2025.12
CVE:CVE-2024-5591
Severity:CRITICAL
Impact:FortiGate Authentication Bypass | Administrative Access | Internal Network Pivot
FORTIGATEAUTH_BYPASSFIREWALLNETWORK_PIVOT
[CLICK TO VIEW] → FortiGate authentication bypass to internal network compromise
[TOPIC]

Oracle Exploitation

During a security assessment, we identified and exploited a critical Remote Code Execution (RCE) vulnerability in Oracle WebLogic Server. This write-up demonstrates how an unauthenticated attacker can bypass authentication, gain administrative access, upload malicious files, and pivot into the internal network.

Published:2025.12
Severity:CRITICAL
Vulnerability:Oracle WebLogic Server Remote Code Execution
Impact:Authentication Bypass | Administrative Access | Internal Network Pivot
ORACLEWEBLOGICRCEPATH_TRAVERSAL
[CLICK TO VIEW] → Oracle WebLogic RCE exploitation and network pivot
[TOPIC]

OTP Exploitation

During a security assessment, we identified two critical vulnerabilities related to One-Time Password (OTP) implementation. This write-up demonstrates how attackers can flood users with OTP messages and bypass OTP authentication through brute force attacks, effectively neutralizing multi-factor authentication protections.

Published:2025.12
Severity:CRITICAL
Vulnerabilities:OTP Flooding Attack | OTP Bypass via Brute Force
Impact:MFA Bypass | SMS/Email Flooding | Account Compromise
OTPMFA_BYPASSBRUTE_FORCERATE_LIMIT
[CLICK TO VIEW] → OTP flooding and bypass techniques neutralizing MFA