Abusing Adopted Authority on IBM i

​When a CL script invokes a program by name, the so-called Library List is searched for a object with a matching name.
The following picture demonstrates the vulnerability: the program object is invoked based on the Library List: Read More 

Verified by MonsterInsights