代码注入、命令执行
1.内置危险函数
exec
execfile
eval2.标准库危险模块
os
subprocess
commands
3.危险第三方库
Template(user_input) : 模板注入(SSTI)所产生的代码执行
subprocess32
4.反序列化
marshal
PyYAML
pickle和cpickle
shelve
PIL
unzip
Python沙箱逃逸的n种姿势
禁用import的情况下绕过python沙箱
Escaping the Python Sandbox
Python Sandbox Bypass
Python之数据序列化(json、pickle、shelve)
Exploiting Python PIL Module Command Execution Vulnerability
Exploiting Python Code Injection in Web Applications
EXPLOITING PYTHON CODE INJECTION IN WEB APPLICATIONS
Python eval的常见错误封装及利用原理
Exploiting Python’s Eval
Exploiting insecure file extraction in Python for code execution
掌阅iReader某站Python漏洞挖掘
Python Pickle的任意代码执行漏洞实践和Payload构造
django的secret key泄漏导致的命令执行实践
Remote Code Execution on a Facebook server
Python PyYAML反序列化漏洞实验和payload构造
Exploiting Python Deserialization Vulnerabilities
Shellcoding in Python’s serialisation format
PyCodeInjection代码注入实验环境
Exploiting Python Code Injection in Web Applications (翻译版)
Numpy反序列化命令执行(CVE-2019-6446)浅析
代码审计
Python代码审计连载之一:CSRF 同 https://www.cdxy.me/?p=736Python代码审计连载之二:SSTI 同 https://www.cdxy.me/?p=738Python代码审计连载之三:Server Side Request 同 https://www.cdxy.me/?p=744Python代码审计连载之四:Command Execution 同 https://www.cdxy.me/?p=747Dangerous Python Functions, Part 1Dangerous Python Functions, Part 2Dangerous Python Functions, Part 3来自openstack安全团队的python代码静态审计工具来自openstack安全团队的python代码静态审计工具2Django相关
Django debug page XSS漏洞(CVE-2017-12794)分析Django DeleteView without confirmation template, but with CSRF attackDjango CSRF Bypass (CVE-2016-7401) 漏洞分析Django CSRF Bypass 漏洞分析(CVE-2016-7401)Django的两个url跳转漏洞分析:CVE-2017-7233&7234Python 格式化字符串漏洞(Django为例) 同 https://xz.aliyun.com/t/288python和django的目录遍历漏洞(任意文件读取)Django JSONField SQL注入漏洞(CVE-2019-14234)分析与影响package钓鱼
被忽视的攻击面:Python package 钓鱼https://www.pytosquatting.org/LDAP注入
SSRF
Splash SSRF 到获取内网服务器 ROOT 权限XSS
Flask Debugger页面上的通用XSS漏洞分析和挖掘过程记录SQLI
讨论PythonWeb开发中可能会遇到的安全问题之SQL注入Django JSONField SQL注入漏洞(CVE-2019-14234)分析与影响SSTI模版注入
Python Security Auditing (II): SSTIexploring-ssti-in-flask-jinja2exploring-ssti-in-flask-jinja2-part-iipython webshell
https://github.com/evilcos/python-webshellhttps://github.com/ahhh/Reverse_DNS_Shellpaper
Python_Hack_知道创宇_北北(孙博).pdf其他
Supervisord远程命令执行漏洞(CVE-2017-11610)基于mezzanine的攻防比赛环境搭建及XXE漏洞构造/Python Waf黑名单过滤下的一些Bypass思路Pwnhub Web题Classroom题解与分析Programming Secure Web Applications in Python[CVE-2016-5699] HTTP Header Injection in Python urllib 同 http://www.anquan.us/static/drops/papers-16905.html[CVE-2019-9740] Python urllib CRLF injection vulnerability 同 https://xz.aliyun.com/t/5123Hack Redis via Python urllib HTTP Header Injection安全工具
struts2 S2-016/S2-017 Python GetShellPython JSON Fuzzer: PyJFuzzhttps://github.com/smartFlash/pySecurity对象注入、底层安全
DEFENCELY CLARIFIES PYTHON OBJECT INJECTION EXPLOITATIONOWASP Python Security ProjectEscaping a Python sandbox with a memory corruption bughttps://github.com/bit4woo/python_sec如有侵权,请联系删除
文章来源: http://mp.weixin.qq.com/s?__biz=Mzk0NjE0NDc5OQ==&mid=2247512675&idx=2&sn=ae99c1d741b54f21da69bc8eb8d1429c&chksm=c3086113f47fe805fe4466fa8f385acda7a3192fe1ba86414892e3054561cd476da4f690fb14#rd
如有侵权请联系:admin#unsafe.sh