harrier

@harrier

Joined on Aug 5, 2018

  • deserializeme (450, 3 solves, solved by @ozetta and @harrier) Update: It was assigned as CVE-2020-14343 after the contest. This was a fun challenge exploiting a deserialize service in Python. The server is using pyYAML and Flask, with the source code below: from flask import Flask, session, request, make_response import yaml
     Like 1 Bookmark