paint-brush
Escaping a Python sandbox with a memory corruption bugby@gabecpike
11,185 reads
11,185 reads

Escaping a Python sandbox with a memory corruption bug

by Gabe Pike10mMarch 23rd, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A few weeks ago I decided to scratch an itch I’ve been having for a while — to participate in some bug bounty programs. Perhaps the most daunting task of the bug bounty game is to pick a program which yields the highest return on investment. Soon though, I stumbled upon a web application that executes user-submitted code in a <a href="https://hackernoon.com/tagged/python" target="_blank">Python</a> sandbox. This looked interesting so I decided to pursue it.

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Escaping a Python sandbox with a memory corruption bug
Gabe Pike HackerNoon profile picture
Gabe Pike

Gabe Pike

@gabecpike

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite