webProeasy
Соленый огурец (Salty Pickle)
hackerlab
Task: Flask notes app stores data in pickle-serialized cookies. Solution: Exploit insecure pickle deserialization via __reduce__ method to achieve RCE and read the flag.
$ ls tags/ techniques/
Insecure Pickle DeserializationRCE via __reduce__ methodCookie-based payload injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Печеньки с молочком (Cookies with Milk)— duckerz
- [misc][Pro]Калькулятор— hackerlab
- [web][Pro]Заметки (Notes)— hackerlab
- [web][Pro]Lab 13 — WebForge — Insecure Deserialization in Config Import— hackadvisor
- [web][Pro]original_task— miptctf