A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"Hashtag": "as:Hashtag"
}
],
"id": "https://abpe.org/users/gslin/statuses/113829166057943788",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-01-14T22:53:54Z",
"url": "https://abpe.org/@gslin/113829166057943788",
"attributedTo": "https://abpe.org/users/gslin",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://abpe.org/users/gslin/followers"
],
"sensitive": false,
"atomUri": "https://abpe.org/users/gslin/statuses/113829166057943788",
"inReplyToAtomUri": null,
"conversation": "tag:abpe.org,2025-01-14:objectId=187026:objectType=Conversation",
"content": "<p>rsync 的漏洞</p><p>在 Lobsters 上看到「RSYNC: 6 vulnerabilities」這個,裡面提到了 rsync 的漏洞問題,包括了 RCE:</p><p>Two independent groups of researchers have identified a total of 6 vulnerabilities in rsync. In the most severe CVE, an attacker only requires anonymous read access to a rsync server, such as a public mirror</p><p><a href=\"https://blog.gslin.org/archives/2025/01/15/12218/rsync-%e7%9a%84%e6%bc%8f%e6%b4%9e/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blog.gslin.org/archives/2025/0</span><span class=\"invisible\">1/15/12218/rsync-%e7%9a%84%e6%bc%8f%e6%b4%9e/</span></a></p><p><a href=\"https://abpe.org/tags/Computer\" class=\"mention hashtag\" rel=\"tag\">#<span>Computer</span></a> <a href=\"https://abpe.org/tags/Murmuring\" class=\"mention hashtag\" rel=\"tag\">#<span>Murmuring</span></a> <a href=\"https://abpe.org/tags/Network\" class=\"mention hashtag\" rel=\"tag\">#<span>Network</span></a> <a href=\"https://abpe.org/tags/Security\" class=\"mention hashtag\" rel=\"tag\">#<span>Security</span></a> <a href=\"https://abpe.org/tags/Service\" class=\"mention hashtag\" rel=\"tag\">#<span>Service</span></a> <a href=\"https://abpe.org/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://abpe.org/tags/code\" class=\"mention hashtag\" rel=\"tag\">#<span>code</span></a> <a href=\"https://abpe.org/tags/execution\" class=\"mention hashtag\" rel=\"tag\">#<span>execution</span></a> <a href=\"https://abpe.org/tags/rce\" class=\"mention hashtag\" rel=\"tag\">#<span>rce</span></a> <a href=\"https://abpe.org/tags/remote\" class=\"mention hashtag\" rel=\"tag\">#<span>remote</span></a> <a href=\"https://abpe.org/tags/rsync\" class=\"mention hashtag\" rel=\"tag\">#<span>rsync</span></a> <a href=\"https://abpe.org/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>",
"contentMap": {
"zh": "<p>rsync 的漏洞</p><p>在 Lobsters 上看到「RSYNC: 6 vulnerabilities」這個,裡面提到了 rsync 的漏洞問題,包括了 RCE:</p><p>Two independent groups of researchers have identified a total of 6 vulnerabilities in rsync. In the most severe CVE, an attacker only requires anonymous read access to a rsync server, such as a public mirror</p><p><a href=\"https://blog.gslin.org/archives/2025/01/15/12218/rsync-%e7%9a%84%e6%bc%8f%e6%b4%9e/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">blog.gslin.org/archives/2025/0</span><span class=\"invisible\">1/15/12218/rsync-%e7%9a%84%e6%bc%8f%e6%b4%9e/</span></a></p><p><a href=\"https://abpe.org/tags/Computer\" class=\"mention hashtag\" rel=\"tag\">#<span>Computer</span></a> <a href=\"https://abpe.org/tags/Murmuring\" class=\"mention hashtag\" rel=\"tag\">#<span>Murmuring</span></a> <a href=\"https://abpe.org/tags/Network\" class=\"mention hashtag\" rel=\"tag\">#<span>Network</span></a> <a href=\"https://abpe.org/tags/Security\" class=\"mention hashtag\" rel=\"tag\">#<span>Security</span></a> <a href=\"https://abpe.org/tags/Service\" class=\"mention hashtag\" rel=\"tag\">#<span>Service</span></a> <a href=\"https://abpe.org/tags/Software\" class=\"mention hashtag\" rel=\"tag\">#<span>Software</span></a> <a href=\"https://abpe.org/tags/code\" class=\"mention hashtag\" rel=\"tag\">#<span>code</span></a> <a href=\"https://abpe.org/tags/execution\" class=\"mention hashtag\" rel=\"tag\">#<span>execution</span></a> <a href=\"https://abpe.org/tags/rce\" class=\"mention hashtag\" rel=\"tag\">#<span>rce</span></a> <a href=\"https://abpe.org/tags/remote\" class=\"mention hashtag\" rel=\"tag\">#<span>remote</span></a> <a href=\"https://abpe.org/tags/rsync\" class=\"mention hashtag\" rel=\"tag\">#<span>rsync</span></a> <a href=\"https://abpe.org/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://abpe.org/tags/computer",
"name": "#computer"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/murmuring",
"name": "#murmuring"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/network",
"name": "#network"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/security",
"name": "#security"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/service",
"name": "#service"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/code",
"name": "#code"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/execution",
"name": "#execution"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/rce",
"name": "#rce"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/remote",
"name": "#remote"
},
{
"type": "Hashtag",
"href": "https://abpe.org/tags/rsync",
"name": "#rsync"
}
],
"replies": {
"id": "https://abpe.org/users/gslin/statuses/113829166057943788/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://abpe.org/users/gslin/statuses/113829166057943788/replies?only_other_accounts=true&page=true",
"partOf": "https://abpe.org/users/gslin/statuses/113829166057943788/replies",
"items": []
}
},
"likes": {
"id": "https://abpe.org/users/gslin/statuses/113829166057943788/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://abpe.org/users/gslin/statuses/113829166057943788/shares",
"type": "Collection",
"totalItems": 0
}
}