12 java Security -- java deserialization CC7 chain analysis
Before analyzing the CC7 chain, you need to have a certain understanding of the source code of the Hashtable set.
In terms of thinking, I think the CC7 utilization chain is more like a transformation from the CC6 utilization chain, but the CC7 chain does not use HashSet, but uses Hashtable to construct a new utilization chain.
After testing ...
Posted by troybtj on Sun, 19 Dec 2021 17:08:40 +0100
Framework vulnerability Series 1: struts vulnerability summary
preface:
The loopholes reproduced in this article are not particularly comprehensive, but the loopholes in the last two years have been selected for reproduction in order to effectively reproduce the loopholes. After all, some old loopholes basically do not exist.
1, Introduction to Struts
1. Introduction
Basic introduction:
Struts is Ap ...
Posted by Lucidnight on Fri, 03 Dec 2021 15:57:53 +0100
ThinkPHP5.0.24_ Analysis of deserialization vulnerability in Linux
ThinkPHP5.0.24_ Analysis of deserialization vulnerability in Linux
ThinkPHP5.0.24Vulnerability code<?php
namespace app\index\controller;
class Index
{
public function test01(){
$code = $_POST['code'];
unserialize(base64_decode($code));
}
}
payload/index.php/index/index/test01
POST
code=TzoyNzoidGhpbmtccHJvY2Vzc1xwa ...
Posted by trevorturtle on Mon, 22 Nov 2021 06:40:53 +0100
kubernetes based on jenkins spinnaker's ci/cd practice - adding product image scanning
preface:Early jenkins assumed all the functions of ci/cd in kubernetes Jenkins Pipeline evolution , we are going to split the cd continuous integration into spinnaker!Of course, the normal idea should be to get through the user account of jenkins spinnaker and integrate ldap.spinnaker account system. Relevant experiments have been done before i ...
Posted by bow-viper1 on Sun, 21 Nov 2021 03:31:53 +0100