News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Milw0rm.com:
Exploit - PHP5 COM Object Security Bypass (Windows)
October 23, 2007 @ 09:31:00

An exploit for PHP's COM objects on the 5.x series has been reported by shinnai - an issue that allows for a bypass of safe_mode and disable_function settings.

The exploit has been published as a PHP file for easy testing on your Windows/PHP installation (it was tested on WinXP Pro SP2 on both the CLI and Apache). No additional modules are needed for this exploit - only the COM functions and a Windows system.

The issue comes from an overflow in the str_repeat function allowing for the execution of whatever applications the developer wants on the remote Windows machine (including the ability to create and remove files and directories). There is no path for this issue currently (should be corrected in the next minor PHP release).

0 comments voice your opinion now!
com object security bypass safemode disablefunction overflow strrepeat com object security bypass safemode disablefunction overflow strrepeat


blog comments powered by Disqus

Similar Posts

Debuggable Blog: Finally - CakePHP 1.2 RC1 is out!

Demian Turner's Blog: Seagull 0.6.4 Release (fixes Security Isse from 0.6.3)

Dagfinn Reiersol's Blog: Real programming with PHP 5.3 (part 3): Links

ThinkPHP Blog: SQL injections for dummies - and how to fix them

Matthew Weier O'Phinney's Blog: Proxies in PHP


Community Events





Don't see your event here?
Let us know!


laravel library series security composer interview podcast release version conference language tool community list opinion introduction framework symfony voicesoftheelephpant artisanfiles

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework