paint-brush
Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Executionby@heydanny
739 reads
739 reads

Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Execution

by Dhanesh Dodia1mJuly 25th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the usage of `JSON.load` which is considered unsafe when used with untrusted input. In order to reproduce the steps, we first require to install ‘JMESPath 1.6.0’ or before: Jmespath. Pick the desired payload, I have picked one from [pentestmonkey.net/cheat-sheet/shells/reverse-shells.
featured image - Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Execution
Dhanesh Dodia HackerNoon profile picture
Dhanesh Dodia

Dhanesh Dodia

@heydanny

😉Just another security guy | 🐱Hacking for fun, money, and for a social cause

About @heydanny
LEARN MORE ABOUT @HEYDANNY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Dhanesh Dodia HackerNoon profile picture
Dhanesh Dodia@heydanny
😉Just another security guy | 🐱Hacking for fun, money, and for a social cause

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite