PHP Zend Hash Vulnerability Exploitation Vector [closed]
- by Resurrected Laplacian
Possible Duplicate:
CVE-2007-5416 PHP Zend Hash Vulnerability Exploitation Vector (Drupal)
According to exploit-db, http://www.exploit-db.com/exploits/4510/, it says the following:
Example: http://www.example.com/drupal/?_menu[callbacks][1][callback]=drupal_eval&_menu[items][][type]=-1&-312030023=1&q=1/
What are "[callbacks]","[1]" and all these stuffs? What should I put in to these stuffs?
Can anyone present a real possible example?
I wasn't asking for a real website; I was asking for a possible example! So, how would address be like - what should I put in to these stuffs, as the question says..