Luca Carettoni
Luca Carettoni
When decompression uses an attacker-controlled zip, it is possible to create a malicious archive containing symlinks which leads to the file decompression outside the original filesystem location. This can be...
As a possible enhancement, it would be nice to list objects' permissions within each bucket.
Since the first commit of this project (back in 2016), **burp-rest-api** has been the default tool for _Burp-powered_ web scanning automation. Many security pros and organizations have relied on this...