diff --git a/Insecure Deserialization/PHP.md b/Insecure Deserialization/PHP.md index 14bc206..08e002e 100644 --- a/Insecure Deserialization/PHP.md +++ b/Insecure Deserialization/PHP.md @@ -189,7 +189,6 @@ $poc->stopBuffering(); ## References * [PHP Object Injection - OWASP](https://www.owasp.org/index.php/PHP_Object_Injection) -* [PHP Object Injection - Thin Ba Shane](http://location-href.com/php-object-injection/) * [PHP unserialize](http://php.net/manual/en/function.unserialize.php) * [PHP Generic Gadget - ambionics security](https://www.ambionics.io/blog/php-generic-gadget-chains) * [POC2009 Shocking News in PHP Exploitation](https://www.owasp.org/images/f/f6/POC2009-ShockingNewsInPHPExploitation.pdf) diff --git a/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_echo.jpg b/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_echo.jpg new file mode 100644 index 0000000..1734547 Binary files /dev/null and b/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_echo.jpg differ diff --git a/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_revshell.jpg b/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_revshell.jpg new file mode 100644 index 0000000..eca7e9b Binary files /dev/null and b/Upload Insecure Files/Picture Metadata/CVE-2021-22204_exiftool_revshell.jpg differ