漏洞描述 Serialize JavaScript是Yahoo开源的一个将 JavaScript 序列化为包含正则表达式和函数的 JSON 超集。 Serialize JavaScript存在跨站脚本漏洞,该漏洞源于没有正确清理某些输入。攻击者利用该漏洞可以注入恶意代码。
相关漏洞推荐 POC CVE-2013-3827: Javafaces LFI POC CVE-2017-12637: SAP NetWeaver Application Server Java 7.5 - Local File Inclusion POC CVE-2020-6287: SAP NetWeaver AS JAVA 7.30-7.50 - Remote Admin Addition POC CVE-2021-37573: Tiny Java Web Server - Cross-Site Scripting POC CVE-2022-29078: Node.js Embedded JavaScript 3.1.6 - Template Injection POC CVE-2023-29827: Embedded JavaScript(EJS) 3.1.6 - Template Injection POC CVE-2025-46822: Java-springboot-codebase 1.1 - Arbitrary File Read POC CVE-2017-12149: Java/Jboss Deserialization [RCE] POC CVE-2018-15531: JavaMelody XXE POC javamelody-detect: JavaMelody Monitoring Exposed POC jinjava-ssti: Jinjava - Server Side Template Injection POC javascript-env-config: JavaScript Environment Configuration - Detect POC javascript-env: JavaScript Environment Configuration - Detect