Skip to content

Commit 266a0cb

Browse files
committed
update
update
1 parent 7978650 commit 266a0cb

File tree

1 file changed

+9
-23
lines changed

1 file changed

+9
-23
lines changed

Readme.md

Lines changed: 9 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
1-
代码注入、命令执行
1+
### 代码注入、命令执行
22

33
1.内置危险函数
44

55
exec
66
execfile
77
eval
8-
[Python eval的常见错误封装及利用原理](http://xxlegend.com/2015/07/31/Python%20eval%E7%9A%84%E5%B8%B8%E8%A7%81%E9%94%99%E8%AF%AF%E5%B0%81%E8%A3%85%E5%8F%8A%E5%88%A9%E7%94%A8%E5%8E%9F%E7%90%86/)
9-
[Exploiting Python’s Eval](http://www.floyd.ch/?p=584)
10-
118
2.标准库危险模块
129

1310
os
@@ -17,36 +14,25 @@
1714
3.危险第三方库
1815
Template(user_input) : 模板注入(SSTI)所产生的代码执行
1916
subprocess32
20-
4.反序列化
17+
4.反序列化相关库
2118
marshal
2219
PyYAML
2320
pickle和cpickle
2421
shelve
2522
PIL
2623
unzip
24+
25+
2726
参考:
2827

28+
[Python沙箱逃逸的n种姿势](https://xianzhi.aliyun.com/forum/read/2138.html)
29+
2930
[Python之数据序列化(json、pickle、shelve)](http://www.cnblogs.com/yyds/p/6563608.html)
3031

3132
[Exploiting Python PIL Module Command Execution Vulnerability](https://xianzhi.aliyun.com/forum/read/2163.html)
3233

34+
[Exploiting Python Code Injection in Web Applications](https://www.doyler.net/security-not-included/exploiting-python-code-injection)
3335

36+
[EXPLOITING PYTHON CODE INJECTION IN WEB APPLICATIONS](http://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/)
3437

35-
payload构造
36-
37-
前提
38-
eval+compile
39-
多语句
40-
__import__
41-
__import__是一个函数,并且只接受字符串参数,import 都是在它的基础上实现的。
42-
importlib
43-
参考
44-
import相关,沙箱绕过
45-
https://xianzhi.aliyun.com/forum/read/2138.html
46-
代码注入
47-
https://www.doyler.net/security-not-included/exploiting-python-code-injection
48-
http://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/
49-
https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html
50-
codereview
51-
Python Security Auditing (IV): Command Execution
52-
https://www.cdxy.me/?p=747
38+
[Exploiting Python Code Injection in Web Applications](https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html)

0 commit comments

Comments
 (0)