Web Application
Security Research

In-depth analysis of our latest vulnerability findings and best practices for secure development.

WordPress Plugin Vulnerabilities 2017 VS. Static Analysis

11 min read 29 Nov 2017 by Johannes Dahse
WordPress plugins are widely adopted and an attractive target for attackers. In this technical blog post we analyze the most critical vulnerabilities in WordPress plugins of 2017 and share insights about how static code analysis can detect these.

Shopware 5.3.3: PHP Object Instantiation to Blind XXE

8 min read 8 Nov 2017 by Karim El Ouerghemmi
Shopware is a popular e-commerce software. Within only 4 minutes, RIPS discovered two vulnerabilities in the code that bases on Symfony, Doctrine and the Zend Framework. In this blog post we investigate the exploitation of one of these: A rare PHP object instantiation vulnerability (CVE-2017-18357).

Security Analysis with Bamboo Plugin

5 min read 25 Oct 2017 by Martin Bednorz
Bamboo is a widely used software that enables continuous integration, deployment, and delivery of software applications. This blog post introduces our Bamboo integration and how it can be used to continuously analyze your application with RIPS. By automatically detecting and warning about security issues, your production server can be protected from new vulnerabilities.

flatCore CMS 1.4.6: Remote Code Execution and Easteregg

5 min read 17 Oct 2017 by Dennis Detering
flatCore is a lightweight Content Management System (CMS) based on PHP and SQLite. We tested the latest stable version 1.4.6 with RIPS and detected, among others, a critical persistent cross-site scripting vulnerability (CVE-2017-1000428) that can be used by an unauthenticated adversary to attack administrators and to execute PHP code on the web server.

Joomla! 3.7.5 - Takeover in 20 Seconds with LDAP Injection

6 min read 20 Sep 2017 by Robin Peraglie
With over 84 million downloads, Joomla! is one of the most popular content management systems. Our code analysis solution RIPS detected a previously unknown LDAP injection vulnerability in the login controller. This one vulnerability could allow remote attackers to leak the super user password and to fully take over any Joomla! <= 3.7.5 installation that uses LDAP for authentication.