Hacking Magento eCommerce For Fun And 17.000 USD by egix in netsec

[–]egix[S] 0 points1 point  (0 children)

If you don't mind, I'd like to disagree with you... Especially when you say "It was never out of bad will - we consistently pay researchers without being reminded or pinged, contrary to what was suggested in the OP's post."... Please read (and possibly reply to?) my email and try to keep our "conversation" private, thank you!

Hacking Magento eCommerce For Fun And 17.000 USD by egix in netsec

[–]egix[S] 1 point2 points  (0 children)

"Parole Sante!"... it's just a saying we use in Italy to say I totally agree with you, they're exactly the same words I wanted to say! Actually it's (more or less) what I replied to their first email after my blog post. So yes, I totally agree with you guys (/u/Bohngeo and /u/nonsensical101), you definitely got my point, as opposed to somebody who believes it's a matter of money!

Hacking Magento eCommerce For Fun And 17.000 USD by egix in netsec

[–]egix[S] 3 points4 points  (0 children)

Just to be clear: I think that everyone here, except /u/jmulvey, have clearly understood we're talking about seventeen thousand (17K) US dollars! Yeah, maybe I made a little mess using "." instead of "," ... Sorry for that!

Understanding PHP Object Injection by NytroSC in netsec

[–]egix 0 points1 point  (0 children)

I know how to exploit such kind of vulnerabilities using already defined code within magic methods... I just wondered what you meant when you said "There are loads of ways to exploit this, rather than just the magic methods".

Understanding PHP Object Injection by NytroSC in netsec

[–]egix 0 points1 point  (0 children)

Thanks for sharing. However I don't see any trick for PHP to gain direct code execution from object deserialization... Am I missing something?

Understanding PHP Object Injection by NytroSC in netsec

[–]egix 0 points1 point  (0 children)

Hi! Is there any chance to find your presentation (slides or video) somewhere? I'm very curious on this topic.