Skip to content

Instantly share code, notes, and snippets.

View j0lt-github's full-sized avatar
🐍
Working from home

j0lt j0lt-github

🐍
Working from home
View GitHub Profile
@j0lt-github
j0lt-github / jsonpickle_vulnerable.txt
Last active August 7, 2021 13:00
jsonpickle 1.4.2 vulnerable to RCE
Description: JsonPickle 1.4.2 allows remote code execution during deserialization of a malicious payload through the decode() function.
VulnerabilityType: CWE-502: Deserialization of Untrusted Data
Vendor of Product: https://github.com/jsonpickle/jsonpickle
Affected Product Code Base: JsonPickle Python Module
Attack Type: Remote
Impact Code execution : True
Description: JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
VulnerabilityType: CWE-502: Deserialization of Untrusted Data
Vendor of Product: http://jyaml.sourceforge.net (see yaml.org)
Affected Product Code Base: jyaml Java library
Attack Type: Remote