Have your say! Poller is the place where all the important infosec questions are asked.
there is a github link in cource code: https://github.com/congon4tor/poller
from looking at commit we know this is vulnerable to django PickleSerializer RCE and we also found secret_key in previous commits there is also one fake key
we can get the revese shell here but i don't have vps so we go the easy way we know the file name is flag.txt first i created local server with python : python -m http.server 80
and expose it to internet with ngrok : ngrok http 80
now we craft our payload in a way that it will read file content and make a request to our server with that file content in GET request here is final exploit in python :