[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4

str0ke str0ke at milw0rm.com
Sat Mar 31 13:11:57 UTC 2007


Darkfig,

This wasn't on their site when I posted it on milw0rm.  Was it a
leak'ing problem?

/str0ke

On 3/31/07, GM darkfig <gmdarkfig at gmail.com> wrote:
> readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
> Author: ThE-WoLf-KsA
> Advisory: http://www.milw0rm.com/exploits/3573
>
> The guy copied an article from SecurityReason:
> error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
> http://securityreason.com/achievement_securityalert/41
>
> He changed the title, the author's name, the function, and that's all.


More information about the VIM mailing list