Thanks, this was interesting. But the JSON segment is a little less than 
terrifying as it’s predicated on the misuse of eval(), which is commonly and 
easily avoided. 

 
> On Dec 17, 2015, at 11:00 PM, CODE4LIB automatic digest system 
> <lists...@listserv.nd.edu> wrote:
> 
> 
> Date:    Thu, 17 Dec 2015 09:22:07 -0500
> From:    Andromeda Yelton <andromeda.yel...@gmail.com 
> <mailto:andromeda.yel...@gmail.com>>
> Subject: yaml/xml/json, POST data, bloodcurdling terror
> 
> I strongly recommend this hilarious, terrifying PyCon talk about
> vulnerabilities in yaml, xml, and json processing:
> https://www.youtube.com/watch?v=kjZHjvrAS74 
> <https://www.youtube.com/watch?v=kjZHjvrAS74>
> 
> If you process user-submitted data in these formats and don't yet know why
> you should be flatly terrified, please watch this ASAP; it's illuminating.
> If you *do* know why you should be terrified, watch it anyway and giggle
> along in knowing recognition, because the talk is really very funny.
> 
> -- 
> Andromeda Yelton
> Board of Directors, Library & Information Technology Association:
> http://www.lita.org <http://www.lita.org/>
> http://andromedayelton.com <http://andromedayelton.com/>
> @ThatAndromeda <http://twitter.com/ThatAndromeda 
> <http://twitter.com/ThatAndromeda>>

Reply via email to