Intended Solution
- After the execution of the
$url = addslashes($_POST['URL']);
and thepreg_replace('/(.*)\{url\}(.*)/is', '${1}'.$url.'${2}', $zep_file);
,\"
will finally convert to\\"
. - PHP class constructor could be a function with the same name as the class.
- Perform SSRF attack on MySQL Server with password using php-curl.
Exploit
- Execute
python3 protocol_handler.py
in a server with public IP. - Modify exploit.py with your IP and Port.
- Execute
python3 exploit.py
.
Other Solutions
Although cblock has been removed by ASTLIBRA/zephir-tunnel/secure.patch
, it could still be inserted in the place out of the function scope.
http\");}
__attribute__((constructor)) void exp() {
...
system(xxx);
...
};
function tmp(){
var ch = curl_init();//
原文始发于Github:rwctf2023-ASTLIBRA
相关文章
暂无评论...