Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates how an attacker can take a vulnerability and quickly produce a functional exploit using the Perl LWP module. It demonstrates the process on two recently announced vulnerabilities. Finally, based on this knowledge, it addresses the question of how quickly administrators must patch systems after a new web application vulnerability is announced.
Decreasing Time Between Web Application Vulnerability and Exploitation