PaulDotCom mailing list archives
Re: Exploiting vulnerable php functions
From: Dancing Dan <d4ncingd4n () gmail com>
Date: Wed, 11 Sep 2013 05:36:28 -0500
Exactly. A string concatenate could call string copy which could call string length. It could be directly through an explicit call, the developer could have copy/pasted the code, or the compiler may have performed an optimization. Call graphs of the library in IDA would reveal some cases but, not all. Bart On Sep 10, 2013 9:31 AM, "Robin Wood" <robin () digininja org> wrote:
On 8 September 2013 19:47, Dancing Dan <d4ncingd4n () gmail com> wrote:I haven't looked at PHP internals but, some languages create functions as extensions of other functions as a form of code reuse. This could lead to unexpected file inclusion. Does anybody know if PHP does that?Do you mean one function internally calls another, for example a string compare ignoring case will call the generic string compare but pass in the ignore case flag? I've no idea if PHP does this but would be interested to find out and if it does to get a list of what calls what. RobinBart On Sep 8, 2013 1:39 PM, "Robin Wood" <robin () digininja org> wrote:On 8 Sep 2013 19:01, "Jim Halfpenny" <jim.halfpenny () gmail com> wrote:In short no. Take a look at file inclusion vulnerabilities. http://en.m.wikipedia.org/wiki/File_inclusion_vulnerabilityIf you are suggesting include in a file which uses a vulnerable function then your answer is actually yes. RobinRegards Jim On 8 Sep 2013 04:40, "Sean McCormick" <sean.m.mccormick () gmail com>wrote:If a website is running a version of php with vulnerable functionsdoes the function have to be used in a script in order to exploit the vulnerability?_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Re: Exploiting vulnerable php functions, (continued)
- Re: Exploiting vulnerable php functions allison nixon (Sep 08)
- Re: Exploiting vulnerable php functions Jim Halfpenny (Sep 08)
- Re: Exploiting vulnerable php functions Robin Wood (Sep 08)
- Re: Exploiting vulnerable php functions Dancing Dan (Sep 09)
- Re: Exploiting vulnerable php functions Robin Wood (Sep 10)
- Re: Exploiting vulnerable php functions allison nixon (Sep 10)
- Re: Exploiting vulnerable php functions Ryan Sears (Sep 11)
- Re: Exploiting vulnerable php functions Robin Wood (Sep 11)
- Re: Exploiting vulnerable php functions Sean McCormick (Sep 12)
- Re: Exploiting vulnerable php functions Robin Wood (Sep 13)
- Re: Exploiting vulnerable php functions Robin Wood (Sep 08)
- Re: Exploiting vulnerable php functions Dancing Dan (Sep 11)
- Re: Exploiting vulnerable php functions Danny Chrastil (Sep 09)
- Re: Exploiting vulnerable php functions Jim Halfpenny (Sep 09)