PHP Zend Hash Vulnerability Exploitation Vector [closed]

Posted by Resurrected Laplacian on Super User See other posts from Super User or by Resurrected Laplacian
Published on 2012-09-23T06:31:22Z Indexed on 2012/09/23 9:40 UTC
Read the original article Hit count: 222

Filed under:
|
|
|

Possible Duplicate:
CVE-2007-5416 PHP Zend Hash Vulnerability Exploitation Vector (Drupal)

According to exploit-db, http://www.exploit-db.com/exploits/4510/, it says the following:

Example: http://www.example.com/drupal/?_menu[callbacks][1][callback]=drupal_eval&_menu[items][][type]=-1&-312030023=1&q=1/

What are "[callbacks]","[1]" and all these stuffs? What should I put in to these stuffs?

Can anyone present a real possible example?

I wasn't asking for a real website; I was asking for a possible example! So, how would address be like - what should I put in to these stuffs, as the question says..

© Super User or respective owner

Related posts about php

Related posts about cms