From 47cae5fddd06bf3a44f7b0cbccc5a8dcf6fa7ee0 Mon Sep 17 00:00:00 2001 From: CPol Date: Tue, 6 Jul 2021 18:09:19 +0000 Subject: [PATCH] GitBook: [master] one page modified --- .../disable_functions-bypass-php-fpm-fastcgi.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi.md b/pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi.md index 6f8c0adfa..fcddbd4d5 100644 --- a/pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi.md +++ b/pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi.md @@ -21,6 +21,10 @@ For example, when the CGI script http://mysitename.com/**cgi-bin/file.pl** is ac The need to develop FastCGI is that Web was arisen by applications' rapid development and complexity, as well to address the scalability shortcomings of CGI technology. To meet those requirements [Open Market](http://en.wikipedia.org/wiki/Open_Market) introduced **FastCGI – a high performance version of the CGI technology with enhanced capabilities.** +## RCE \(7.\[123\].x\) + +This [**metasploit module**](https://www.rapid7.com/db/modules/exploit/multi/http/php_fpm_rce/) exploits an underflow vulnerability in versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 of **PHP-FPM on Nginx**. + ## disable\_functions bypass It's possible to run PHP code abusing the FastCGI and avoiding the `disable_functions` limitations.