In this presentation, we will share our latest research into attacking JDBC.
We will start with the derivation of JDBC attacks including the JDBC concept and root cause of vulnerability. We will then giveย a more in-depth analysis of occurred implementations including the 0day we found (Weblogic RCE). Finally we will share some new ways of exploiting JDBC including XXE and RCE issues – we will also disclose some 0day vulnerabilities in DB2, JBoss Wildfly, ModeShape.