Skip to content

Commit

Permalink
Update App.java
Browse files Browse the repository at this point in the history
!xml data
  • Loading branch information
shawnmckinney authored Dec 3, 2023
1 parent e0ca035 commit 6e7214f
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/main/java/com/example/App.java
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ public static void main(String[] args)
// 2. In a real-world exploit there'll be some sort of resource activity where the serialized object is transmitted to the host (the trojan horse is accepted).
// It might be an HTTP invocation.

// 3. The XML data containing rogue object is parsed, instantiated, and executed on the machine being targeted.
// 3. The data containing rogue object is parsed, instantiated, and executed on the machine being targeted.
// It is during the deserialize method the rogue object executes.
myObj = myApp.deserialize();

Expand Down

0 comments on commit 6e7214f

Please sign in to comment.