webPromedium
PulseOps — Insecure Deserialization in Config Import
hackadvisor
Task: Node.js/Express operations dashboard with config import/export feature that deserializes user-supplied data via node-serialize. Solution: Exploit node-serialize's _$$ND_FUNC$$_ IIFE pattern to achieve RCE and read /root/flag.txt.
$ ls tags/ techniques/
node_serialize_unserialize_iifend_func_function_injectioncommand_execution_via_child_process_execsync
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 326 — PulseBoard — NoSQL Injection in Authentication— hackadvisor
- [web][Pro]Lab 322 — NetPulse — IP Spoofing to RCE via Polling Agent API— hackadvisor
- [web][Pro]Lab 54 — PulseGuard — RCE via node:vm Sandbox Escape— hackadvisor
- [web][Pro]Lab 36 — PulseBoard — Prototype Pollution to RCE via EJS— hackadvisor
- [web][Pro]PulseDesk — Blind SQL Injection in Password Reset Token Extraction— hackadvisor