Celestial

Short Snippet on Node JS deserialization

We are presented with a node.js application that upon refresh returns dynamic content.

Upon decoding the base64 cookie, we see that it is node JS. serialization

{"username":"Dummy","country":"Idk Probably Somewhere Dumb","city":"Lametown","num":"3"}

The username field looks injectable, lets try to put our reverse shell payload in it.

The $$NDFUNC$$ indicates the presence of embedded javascript and executes the rest of the following line (our reverse shell_) immediately because of the IIFE brackets added at the end which will invoke the function when the object is created.

With that, we get our shell.

Last updated