Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Executionby@heydanny
618 reads

Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Execution

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the usage of `JSON.load` which is considered unsafe when used with untrusted input. In order to reproduce the steps, we first require to install ‘JMESPath 1.6.0’ or before: Jmespath. Pick the desired payload, I have picked one from [pentestmonkey.net/cheat-sheet/shells/reverse-shells.
featured image - Here’s a Proof-Of-Concept for CVE-2022–32511 to Gain Remote Code Execution
Dhanesh Dodia HackerNoon profile picture

@heydanny

Dhanesh Dodia


Receive Stories from @heydanny

react to story with heart
Dhanesh Dodia HackerNoon profile picture
by Dhanesh Dodia @heydanny.😉Just another security guy | 🐱Hacking for fun, money, and for a social cause
Read My Stories

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa