PHP Zend Hash Vulnerability Exploitation Vector [closed]
Posted
by
Resurrected Laplacian
on Super User
See other posts from Super User
or by Resurrected Laplacian
Published on 2012-09-23T06:31:22Z
Indexed on
2012/09/23
9:40 UTC
Read the original article
Hit count: 222
Possible Duplicate:
CVE-2007-5416 PHP Zend Hash Vulnerability Exploitation Vector (Drupal)
According to exploit-db, http://www.exploit-db.com/exploits/4510/, it says the following:
Example: http://www.example.com/drupal/?_menu[callbacks][1][callback]=drupal_eval&_menu[items][][type]=-1&-312030023=1&q=1/
What are "[callbacks]","[1]" and all these stuffs? What should I put in to these stuffs?
Can anyone present a real possible example?
I wasn't asking for a real website; I was asking for a possible example! So, how would address be like - what should I put in to these stuffs, as the question says..
© Super User or respective owner