Forwarded from Security Analysis
⭕️ PHP 7.3-8.1 disable_functions bypass using string concatenation
PHP 7.3-8.1 disable_functions bypass [concat_function]This exploit uses a bug in a function that handles string concatenation.
A statement such as $a.$b might result in memory corruption if certain conditions are met.
The bugreport provides a very thorough analysis of the vulnerability.
The PoC was tested on various php builds for Debian/Ubuntu/CentOS/FreeBSD with cli/fpm/apache2 server APIs and found to work reliably.
https://github.com/mm0r1/exploits/tree/master/php-concat-bypass
#PHP #bypass #disable_functions
@securation
PHP 7.3-8.1 disable_functions bypass [concat_function]This exploit uses a bug in a function that handles string concatenation.
A statement such as $a.$b might result in memory corruption if certain conditions are met.
The bugreport provides a very thorough analysis of the vulnerability.
The PoC was tested on various php builds for Debian/Ubuntu/CentOS/FreeBSD with cli/fpm/apache2 server APIs and found to work reliably.
https://github.com/mm0r1/exploits/tree/master/php-concat-bypass
#PHP #bypass #disable_functions
@securation
Forwarded from CTF Community | Hints
Remote Desktop Client / Server on PowerShell
https://github.com/DarkCoderSc/PowerRemoteDesktop
#pentest #redteam #git
https://github.com/DarkCoderSc/PowerRemoteDesktop
#pentest #redteam #git
GitHub
GitHub - PhrozenIO/PowerRemoteDesktop: Remote Desktop entirely coded in PowerShell.
Remote Desktop entirely coded in PowerShell. Contribute to PhrozenIO/PowerRemoteDesktop development by creating an account on GitHub.
IOMobileFrameBuffer vulnerability in iPhone 6s and later (until iOS 15.3) has been actively exploited (CVE-2022-22587)
Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited
https://support.apple.com/en-us/HT213053
Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited
https://support.apple.com/en-us/HT213053
Apple Support
About the security content of iOS 15.3 and iPadOS 15.3
This document describes the security content of iOS 15.3 and iPadOS 15.3.