You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The method of using hash: Use SHA1 to locate unique identifiers for Lua scripts.
Possible exploitation method: Construct two different Lua scripts, A and B, with the same hash value. Script A is benign, while script B is malicious. After script A passes the review and becomes part of the execution plan, uploading script B will cause script B to regain the identifier of script A, resulting in a takeover.
The text was updated successfully, but these errors were encountered:
The method of using hash: Use SHA1 to locate unique identifiers for Lua scripts.
Possible exploitation method: Construct two different Lua scripts, A and B, with the same hash value. Script A is benign, while script B is malicious. After script A passes the review and becomes part of the execution plan, uploading script B will cause script B to regain the identifier of script A, resulting in a takeover.
The text was updated successfully, but these errors were encountered: