Celestial
Short Snippet on Node JS deserialization
Last updated
Short Snippet on Node JS deserialization
Last updated
We are presented with a node.js application that upon refresh returns dynamic content.
Upon decoding the base64 cookie, we see that it is node JS. serialization
The username field looks injectable, lets try to put our reverse shell payload in it.
The $$ND
FUNC$$
indicates the presence of embedded javascript and executes the rest of the following line (our reverse shell_) immediately because of the IIFE brackets added at the end which will invoke the function when the object is created.
With that, we get our shell.