File tree 1 file changed +9
-23
lines changed
1 file changed +9
-23
lines changed Original file line number Diff line number Diff line change 1
- 代码注入、命令执行
1
+ ### 代码注入、命令执行
2
2
3
3
1.内置危险函数
4
4
5
5
exec
6
6
execfile
7
7
eval
8
- [ Python eval的常见错误封装及利用原理] ( http://xxlegend.com/2015/07/31/Python%20eval%E7%9A%84%E5%B8%B8%E8%A7%81%E9%94%99%E8%AF%AF%E5%B0%81%E8%A3%85%E5%8F%8A%E5%88%A9%E7%94%A8%E5%8E%9F%E7%90%86/ )
9
- [ Exploiting Python’s Eval] ( http://www.floyd.ch/?p=584 )
10
-
11
8
2.标准库危险模块
12
9
13
10
os
17
14
3.危险第三方库
18
15
Template(user_input) : 模板注入(SSTI)所产生的代码执行
19
16
subprocess32
20
- 4.反序列化
17
+ 4.反序列化相关库
21
18
marshal
22
19
PyYAML
23
20
pickle和cpickle
24
21
shelve
25
22
PIL
26
23
unzip
24
+
25
+
27
26
参考:
28
27
28
+ [ Python沙箱逃逸的n种姿势] ( https://xianzhi.aliyun.com/forum/read/2138.html )
29
+
29
30
[ Python之数据序列化(json、pickle、shelve)] ( http://www.cnblogs.com/yyds/p/6563608.html )
30
31
31
32
[ Exploiting Python PIL Module Command Execution Vulnerability] ( https://xianzhi.aliyun.com/forum/read/2163.html )
32
33
34
+ [ Exploiting Python Code Injection in Web Applications] ( https://www.doyler.net/security-not-included/exploiting-python-code-injection )
33
35
36
+ [ EXPLOITING PYTHON CODE INJECTION IN WEB APPLICATIONS] ( http://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/ )
34
37
35
- payload构造
36
-
37
- 前提
38
- eval+compile
39
- 多语句
40
- __import__
41
- __import__是一个函数,并且只接受字符串参数,import 都是在它的基础上实现的。
42
- importlib
43
- 参考
44
- import相关,沙箱绕过
45
- https://xianzhi.aliyun.com/forum/read/2138.html
46
- 代码注入
47
- https://www.doyler.net/security-not-included/exploiting-python-code-injection
48
- http://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/
49
- https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html
50
- codereview
51
- Python Security Auditing (IV): Command Execution
52
- https://www.cdxy.me/?p=747
38
+ [ Exploiting Python Code Injection in Web Applications] ( https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html )
You can’t perform that action at this time.
0 commit comments