Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it possible in "php-concat-bypass" to return back ability to... #11

Open
aels opened this issue Jan 14, 2022 · 2 comments
Open

Is it possible in "php-concat-bypass" to return back ability to... #11

aels opened this issue Jan 14, 2022 · 2 comments

Comments

@aels
Copy link

aels commented Jan 14, 2022

Is it possible in "php-concat-bypass" exploit POC to return back the ability to execute functions like proc_open, popen, passthru etc.?
Not just introduce new function "pwn", but load disabled functions?

Treat it as a feature request. I'll pay 500$ for this in btc.
Love, Peace =*

@mm0r1
Copy link
Owner

mm0r1 commented Jan 20, 2022

What are the practical reason to do that? Escaping out of the php jail via pwn=system allows you to completely ignore all restrictions set by the interpreter.

@aels
Copy link
Author

aels commented Jan 22, 2022

the only reason is cuz proc_open gives much more control of execution flaw, offering interaction with stdin\stdout, that system do not

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants