From 33d9e24bed899005d3307cc815ce24e63199ee3b Mon Sep 17 00:00:00 2001 From: idealphase Date: Sun, 5 May 2024 16:16:36 +0700 Subject: [PATCH] Update Ruby.md Change from the invalid 404 URL to the valid one. (https://pentesterlab.com/exercises/ruby_ugadget/course) --- Insecure Deserialization/Ruby.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Insecure Deserialization/Ruby.md b/Insecure Deserialization/Ruby.md index c3f2fa658e..3757ae0859 100644 --- a/Insecure Deserialization/Ruby.md +++ b/Insecure Deserialization/Ruby.md @@ -58,6 +58,6 @@ Universal gadget for ruby 2.x - 3.x. - [RUBY 2.X UNIVERSAL RCE DESERIALIZATION GADGET CHAIN - elttam, Luke Jahnke](https://www.elttam.com.au/blog/ruby-deserialization/) - [Universal RCE with Ruby YAML.load - @_staaldraad ](https://staaldraad.github.io/post/2019-03-02-universal-rce-ruby-yaml-load/) -- [Online access to Ruby 2.x Universal RCE Deserialization Gadget Chain - PentesterLab](https://pentesterlab.com/exercises/ruby_ugadget/online) +- [Online access to Ruby 2.x Universal RCE Deserialization Gadget Chain - PentesterLab](https://pentesterlab.com/exercises/ruby_ugadget/course) - [Universal RCE with Ruby YAML.load (versions > 2.7) - @_staaldraad](https://staaldraad.github.io/post/2021-01-09-universal-rce-ruby-yaml-load-updated/) -* [Blind Remote Code Execution through YAML Deserialization - 09 JUNE 2021](https://blog.stratumsecurity.com/2021/06/09/blind-remote-code-execution-through-yaml-deserialization/) \ No newline at end of file +* [Blind Remote Code Execution through YAML Deserialization - 09 JUNE 2021](https://blog.stratumsecurity.com/2021/06/09/blind-remote-code-execution-through-yaml-deserialization/)