<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SSTI on xvsf</title><link>https://xvshifu.github.io/xvsf/tags/ssti/</link><description>Recent content in SSTI on xvsf</description><image><title>xvsf</title><url>https://xvshifu.github.io/xvsf/img/1.png</url><link>https://xvshifu.github.io/xvsf/img/1.png</link></image><generator>Hugo -- 0.160.1</generator><language>zh-cn</language><lastBuildDate>Wed, 07 Jan 2026 10:00:00 +0800</lastBuildDate><atom:link href="https://xvshifu.github.io/xvsf/tags/ssti/index.xml" rel="self" type="application/rss+xml"/><item><title>若依4.8.1漏洞 SSTI绕过获取ShiroKey至RCE</title><link>https://xvshifu.github.io/xvsf/posts/%E8%8B%A5%E4%BE%9D4.8.1%E6%BC%8F%E6%B4%9E-ssti%E7%BB%95%E8%BF%87%E8%8E%B7%E5%8F%96shirokey%E8%87%B3rce/</link><pubDate>Wed, 07 Jan 2026 10:00:00 +0800</pubDate><guid>https://xvshifu.github.io/xvsf/posts/%E8%8B%A5%E4%BE%9D4.8.1%E6%BC%8F%E6%B4%9E-ssti%E7%BB%95%E8%BF%87%E8%8E%B7%E5%8F%96shirokey%E8%87%B3rce/</guid><description>&lt;h1 id="参考文章"&gt;参考文章：&lt;/h1&gt;
&lt;p&gt;若依最新版本4.8.1漏洞 SSTI绕过获取ShiroKey至RCE(全JAVA版本绕过，附带POC)&lt;/p&gt;
&lt;p&gt;&lt;a href="https://mp.weixin.qq.com/s/4yi0UOTgBCsGK6J8qSz8tQ"&gt;https://mp.weixin.qq.com/s/4yi0UOTgBCsGK6J8qSz8tQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;某依最新版本稳定4.8.1 RCE (Thymeleaf模板注入绕过)&lt;/p&gt;</description></item></channel></rss>