Celestial
Short Snippet on Node JS deserialization
We are presented with a node.js application that upon refresh returns dynamic content.

Upon decoding the base64 cookie, we see that it is node JS. serialization
{"username":"Dummy","country":"Idk Probably Somewhere Dumb","city":"Lametown","num":"3"}The username field looks injectable, lets try to put our reverse shell payload in it.
The $$NDFUNC$$ indicates the presence of embedded javascript and executes the rest of the following line (our reverse shell_) immediately because of the IIFE brackets added at the end which will invoke the function when the object is created.
With that, we get our shell.

Last updated