Jump to content
begood

Pwning PHP for fun and chocapicz

Recommended Posts

Posted

Hello everyone !

Today, i’m going to talk about the latest PHP vulnerability discovered by Stefan Esser and published on the 25 of june. You can read the advisory here. Esser did not publish many informations regarding this new vulnerability because of its « dangerous nature », and probably the fact that it’s still unpatched. He only posted few indications and the output of a working exploit without its source code. I never myself really looked into the interpreter’s source code, and decided this was the perfect opportunity to start.

According to the advisory, the vulnerability is caused by the way SPLObjectStorage handle unserialization.

For those of you who are not familiar with PHP, the serialize() function allows you to convert native php data types (arrays, objects) to a string. unserialize do the opposite and convert a string to a php variable. Those two functions are straightforward to use:

read it all here : Nibbles microblog Pwning PHP for fun and chocapicz

Posted

ok, am si eu o intrebare.....a inteles cineva asta cap coada? As avea si eu cateva mici intrebari daca se poate....

1) Cum e suprascris zval-ul care a foss free-d?

2) Cum se paseaza parametrul lui system de la sfarsit?

Mersi.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...