webPromedium

Lab 122 — BuildStream — RCE via Expression Sandbox Escape

hackadvisor

Task: CI/CD pipeline platform evaluates {{ expression }} syntax in step configurations using Node.js vm module sandbox. Solution: Classic vm sandbox escape via constructor chain traversal (this.constructor.constructor) to break out of sandbox, access process.mainModule, require child_process, and read /root/flag.txt.

$ ls tags/ techniques/
expression_injectionfile_read_via_rcevm_sandbox_escapeconstructor_chain_traversaldecoy_flag_recognition

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups