Идет загрузка...
<?php eval('?>' . file_get_contents('php://stdin')); It reads raw PHP code from standard input ( php://stdin ) and executes it using eval() . This is used internally by PHPUnit when running isolated child processes for testing.
If an attacker finds:
curl -X POST --data "<?php system('id'); ?>" \ https://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php If the server misinterprets php://stdin (in a CGI/FastCGI setup), it may read the POST body — leading to . If an attacker finds: curl -X POST --data "<
| Part | Meaning | |------|---------| | index of | Directory listing (often from misconfigured Apache/nginx) | | vendor | Composer dependencies folder | | phpunit | PHPUnit testing framework | | phpunit/src | Source code of PHPUnit | | util | Utilities folder | | eval-stdin.php | A script that executes PHP code from standard input | | work | Intention – how this script functions | ' . file_get_contents('php://stdin'))
vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php If an attacker finds: curl -X POST --data "<
Put together, you are looking for a publicly accessible web directory containing: /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php In PHPUnit (versions 6.x to 9.x), the file eval-stdin.php serves a legitimate internal purpose:
Index of /vendor/phpunit/phpunit/src/Util/PHP/ [ICO] eval-stdin.php 2021-09-01 12:00 1.2K That “index of” page confirms the file exists and is accessible.
Используя данный сайт, вы даете согласие на использование файлов cookie, помогающих нам сделать его удобнее для вас. Подробнее