Shopping Cart
Total:

$0.00

Items:

0

Your cart is empty
Keep Shopping

m0x41nos/TimeAfterFree: PHP 8 Sandbox Escape


PHP 8 sandbox escape PoC demonstrating a disable_functions bypass on Unix-like systems.

This exploit leverages a use-after-free bug to bypass disable_functions and execute system commands. The exploitation techniques used for leaking heap pointers and obtaining read/write primitives utilize the DateInterval object.

The PoC was tested across multiple standard PHP distributions and common server APIs (CLI, PHP-FPM, Apache module) and reproduces deterministically.

exploit demo

  • PHP 8.2.x
  • PHP 8.3.x
  • PHP 8.4.x
  • PHP 8.5.x

PHP core is memory-unsafe, and memory corruption in typical PHP deployments is exploitable. While some PHP memory corruption issues and exploitation strategies are publicly known, others are not. Relying on sandboxing mechanisms such as disable_functions for security is wishful thinking.

The PoC in this repository is provided strictly for educational and research purposes. The author does not endorse or encourage any unauthorized access to systems.



Source link

0
Show Comments (0) Hide Comments (0)
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments