Tags: dynamic-analysis java 

Rating: 2.0

TLDR

  • It's a Java web application that uses vulnerable third-party component (Apache.CXF) without public exploit so we need to reverse engineer the patch or correctly understand the CVE description.
  • From the vulnerable third-party component, it's possible to download local file such as the WAR file.
  • We need to analyze the decompiled Java classes and defeat the obfuscation to identify a hidden backdoor.
Original writeup (https://gist.github.com/farisv/d30df98263d6dea7bad4eedd497a2408).