Submitter : c2a
Date: 10 May 2023
Bounty : undisclosed
Vulnerabilities :
- RCE
- Sandbox Escape
- Authentication Bypass
- Hardcoded Credentials
- Broken Access Control
- Privilege Escalation
- JWT
Programs :
Authors :
Link : https://thinkloveshare.com/hacking/kong-konga-exploitation-and-hardening/