Amarelo Designs (resolution)
This solution refers to which of the apps?
A8 - Amarelo Designs
What did you do to mitigate the vulnerability?
The app had a security flaw, which allowed the attacker to execute code remotely through a serialization vulnerability. The pickle module in Python is widely used to serialize and deserialize Python objects. However, its suitability depends on the context in which it is being used. In this case, JWT (JSON Web Token) was used, as Pickle's functionality allowed the attacker to access the machine through a reverse shell requested through the serialization vulnerability, which is where pickle is capable of serializing Python objects that may contain malicious code. When using JWT for serialization and deserialization, you have additional security benefits provided by authentication and signature verification, which are recommended in this app to prevent remote execution of malicious code.
The images below show the successful hacking attempt on the machine.
After the changes, it is no longer possible to access the machine as root.