Home > Backend Development > PHP Tutorial > Arbitrary file execution vulnerability in PHP under Windows_PHP Tutorial

Arbitrary file execution vulnerability in PHP under Windows_PHP Tutorial

WBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWB
Release: 2016-07-21 16:07:42
Original
991 people have browsed it

Affected systems:
PHP version 4.1.1 under Windows
PHP version 4.0.4 under Windows

Vulnerability description:
🎜>In PHP under Windows, through PHP.EXE, an attacker can make any file appear as a php file, even if the file extension is not php. For example, upload a file, but the extension is mp3, txt, or gif, etc., and then ask PHP to execute it.
 For example:
Upload a gif file, but it is actually a php script file. The content of the file is as follows:
#------------
phpinfo();
?>
#------------

Then the attacker uses PHP Go to execution:
http://www.example.com/php/php.exe/UPLOAD_DIRECTORY/huh.gif

http://www.bkjia.com/PHPjc/315059.htmlwww.bkjia.comtruehttp: //www.bkjia.com/PHPjc/315059.htmlTechArticleAffected systems: PHP version 4.1.1 under Windows PHP version 4.0.4 under Windows  Vulnerability description:  In PHP under Windows, through PHP.EXE, attack...
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Issues
Can Windows be learned?
From 1970-01-01 08:00:00
0
0
0
Install PHP in windows environment
From 1970-01-01 08:00:00
0
0
0
zookeeper extension under windows
From 1970-01-01 08:00:00
0
0
0
Can I play vim happily on Windows?
From 1970-01-01 08:00:00
0
0
0
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template