Screenshots from the blog posts
Summary
In the detailed analysis of CVE-2023-27350, which was an interesting one, was gives unauthenticated access to the attacker by visiting an endpoint in the installation process. This access leads to bypassing the authentication mechanism. During this analysis, we will take a closer look at the code and debug it.
Description
Tags
Comments (4)