Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

PHP 8.1.0-dev - Backdoor Remote Code Execution

By kannthu

Critical
Vidoc logoVidoc Module
#php#backdoor#rce#zerodium
Description

PHP 8.1.0-dev - Backdoor Remote Code Execution

What is the "PHP 8.1.0-dev - Backdoor Remote Code Execution?"

The "PHP 8.1.0-dev - Backdoor Remote Code Execution" module is designed to detect the presence of a backdoor vulnerability in PHP 8.1.0-dev. This vulnerability, known as 'zerodiumvar_dump', allows for the execution of arbitrary PHP code. It is important to note that this module specifically targets the PHP 8.1.0-dev version.

This module is classified as a critical severity vulnerability, indicating the potential for significant harm if exploited. It is crucial to address this vulnerability promptly to prevent unauthorized code execution and potential compromise of the affected system.

Author: dhiyaneshDk

Impact

If the "PHP 8.1.0-dev - Backdoor Remote Code Execution" vulnerability is successfully exploited, an attacker can execute arbitrary PHP code on the affected system. This can lead to unauthorized access, data breaches, and potential compromise of the entire system. The severity of this vulnerability necessitates immediate action to mitigate the risk.

How the module works?

The "PHP 8.1.0-dev - Backdoor Remote Code Execution" module works by sending HTTP requests to the target system and analyzing the response for specific conditions. It checks for the presence of the 'zerodiumvar_dump' backdoor by sending a GET request with a specific User-Agent header value.

An example of the HTTP request sent by this module:

GET /
User-Agent: zerodiumvar_dump(233333*333332);

The module then matches the response body against the condition 'int(77777355556)'. If this condition is met, it indicates the presence of the backdoor vulnerability.

It is important to note that this module is designed to detect the vulnerability and report it. It does not attempt to exploit the vulnerability or perform any malicious actions.

Reference: https://news-web.php.net/php.inte

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET
Headers

User-Agentt: zerodiumvar_dump(233...

Matching conditions
word: int(77777355556)
Passive global matcher
No matching conditions.
On match action
Report vulnerability