慢慢整理。
diable funcs
exec,passthru,popen,popepassthru,proc_open,shell_exec,system
chgrp,chown,chroot,dl,error_log,fsocket,fsockopen,imap_open,ini_alter,ini_restore,link,mail,mb_send_mail,imap_mail,openlog,pfsockopen,proc_get_status,putenv,readlink,stream_socket_server,symlink,syslog
LD_PRELOAD
详细方法:https://www.freebuf.com/web/192052.html
依赖函数:putenv
可利用函数:mail / error_log / 其他执行了本地二进制文件的函数
1 | error_log("test",1,"",""); |
imap_open
依赖:php-imap,php.ini中开启imap.enable_insecure_rsh选项为On
1 | <?php |
php-fpm
webcgi socket stream
依赖:php-fpm
1 | $sock=stream_socket_client('unix:///run/php/php7.0-fpm.sock');fputs($sock, base64_decode($_POST['A']));var_dump(fread($sock, 4096)); |
payload 生成可参考
https://www.xmsec.cc/attack-webcgi-with-socket/
Remote Command Execution (CVE-2019-11043)
Such conditions can be achieved in a pretty standard Nginx configuration. If one has Nginx config like this:
1 | location ~ [^/]\.php(/|$) { |
https://github.com/vulhub/vulhub/tree/master/php/CVE-2019-11043
Windows 系统组件 COM .NET
php.ini 开启 com.allow_dcom = true
启用 extension=php_com_dotnet.dll
1 | <?php |
plt modify x64
Linux kernel version >= 2.98,
PHP-CGI or PHP-FPM (modern Apache versions with mod_php call setuid, thus, there’s no access to procfs),
Linux x64 (you can adjust offsets to make it work on x32 system),
open_basedir = Off (or you should be able to bypass it to read /lib and to read and write in /proc).
https://github.com/beched/php_disable_functions_bypass
php7.4 FFI
From RCTF 2019 NEXTPHP
https://www.mi1k7ea.com/2019/06/07/%E4%BB%8E%E4%B8%80%E9%81%93%E9%A2%98%E7%9C%8BPHP7-4%E7%9A%84FFI%E7%BB%95%E8%BF%87disable-functions/
php7 gc
7.0 - all versions to date
7.1 - all versions to date
7.2 - all versions to date
7.3 - all versions to date
https://github.com/mm0r1/exploits/tree/master/php7-gc-bypass
php7 UAF
7.1 - all versions to date
7.2 < 7.2.19 (released: 30 May 2019)
7.3 < 7.3.6 (released: 30 May 2019)
https://github.com/mm0r1/exploits/tree/master/php-json-bypass
第三方组件
image magick
Bash的破壳漏洞
GhostScript沙箱绕过