php 8.1 remote code execution

preview_player
Показать описание
In this video we are going to solve one of the vulnmachines lab zero is cool.
PHP verion 8.1.0 backdoor was released with a backdoor on March 28th 2021, but the #backdoor was quickly discovered and removed. If this version of #php runs on a server, an #attackers can execute arbitrary code by sending the User-Agentt header.

The original code was restored after the issue was discovered, but then tampered with a second time. The breach would have created a backdoor in any websites that ran the compromised version of PHP, enabling hackers to perform remote code execution on the site.

Vulnmachines​​ - Place for Pentesters
Vulnmachines is online cyber security training platform with a massive number of labs, allowing individuals, students, cyber professionals, companies, universities and all kinds of organizations around the world to enhance their practical skills with Real-world enterprise scenarios.

TheSecOps Group : The SecOps Group is founded by industry veterans. We have over 15 years of experience in providing cyber security consultancy and have worked with some of the largest blue chip companies. Being an independent boutique company, we enable our customers to continuously identify and assess their security postures and provide advice in securing against the adversaries.

Our team regularly speaks at international conferences (including Black Hat, Defcon, HITB, and OWASP Appsec). We pride ourselves in hiring the best talent and our passion is to stay up-to-date with the latest in the world of ethical hacking.

Follow us

#cve #bugbounty #backdoor #exploit #pentesting #rce #infosec #pentest #php8 #vulnerability #cybersecurity #2021 #owasptop10 #owasp
Рекомендации по теме