Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "PHP 8.1.0-dev - Backdoor Remote Code Execution" module is designed to detect the presence of a backdoor vulnerability in PHP 8.1.0-dev. This vulnerability, known as 'zerodiumvar_dump', allows for the execution of arbitrary PHP code. It is important to note that this module specifically targets the PHP 8.1.0-dev version.
This module is classified as a critical severity vulnerability, indicating the potential for significant harm if exploited. It is crucial to address this vulnerability promptly to prevent unauthorized code execution and potential compromise of the affected system.
Author: dhiyaneshDk
If the "PHP 8.1.0-dev - Backdoor Remote Code Execution" vulnerability is successfully exploited, an attacker can execute arbitrary PHP code on the affected system. This can lead to unauthorized access, data breaches, and potential compromise of the entire system. The severity of this vulnerability necessitates immediate action to mitigate the risk.
The "PHP 8.1.0-dev - Backdoor Remote Code Execution" module works by sending HTTP requests to the target system and analyzing the response for specific conditions. It checks for the presence of the 'zerodiumvar_dump' backdoor by sending a GET request with a specific User-Agent header value.
An example of the HTTP request sent by this module:
GET /
User-Agent: zerodiumvar_dump(233333*333332);
The module then matches the response body against the condition 'int(77777355556)'. If this condition is met, it indicates the presence of the backdoor vulnerability.
It is important to note that this module is designed to detect the vulnerability and report it. It does not attempt to exploit the vulnerability or perform any malicious actions.
Reference: https://news-web.php.net/php.inte
User-Agentt: zerodiumvar_dump(233...