This post explores the security implications of JNDI Injection, a vulnerability that allows malicious actors to execute unauthorized code by manipulating JNDI lookups. It explains the architecture and key features of JNDI, discusses the attack flow and techniques for exploiting JNDI, and highlights the changes made in newer JDK versions to prevent the vulnerability.

2m read time From infosecwriteups.com
Post cover image

Sort: