description |
---|
If the source code gets leaky, dig through the spaghetti a little. |
PHP Vulnerabilities could fill a library and will likely continue to fill evermore through the years of this language's livelihood on the web. If you do get a chance to see the source code of a web app; be it open-source on github, a white-box test or just a poorly implemented leaky framework, here are some golden nuggets to grep for.
XSS:
grep -Ri "echo" .
grep -Ri "$_" . | grep "echo"
grep -Ri "$_GET" . | grep "echo"
grep -Ri "$_POST" . | grep "echo"
grep -Ri "$_REQUEST" . | grep "echo"
Command execution:
grep -Ri "shell_exec(" .
grep -Ri "system(" .
grep -Ri "exec(" .
grep -Ri "popen(" .
grep -Ri "passthru(" .
grep -Ri "proc_open(" .
grep -Ri "pcntl_exec(" .
Code execution:
grep -Ri "eval(" .
grep -Ri "assert(" .
grep -Ri "preg_replace" . | grep "/e"
grep -Ri "create_function(" .
SQL Injection:
grep -Ri "$sql" .
grep -Ri "$sql" . | grep "$_"
SQLMAP Cheatsheet for WordPress:
sqlmap -u "
http://target.tld/?paramater=1
" -p "parameter" --technique=B --dbms=mysql --suffix=")--" --string="Test" --sql-query="select user
_login,user_pass from wp_users"
Information leak via phpinfo:
grep -Ri "phpinfo" .
Find dev and debug modes:
grep -Ri "debug" .
grep -Ri "$_GET['debug']" .
grep -Ri "$_GET['test']" .
RFI/LFI:
grep -Ri "file_include" .
grep -Ri "include(" .
grep -Ri "require(" .
grep -Ri "require($file)" .
grep -Ri "include_once(" .
grep -Ri "require_once(" .
grep -Ri "require_once(" . | grep "$_"
Misc:
grep -Ri "header(" . | grep "$_"
grep -Ri '$_SERVER["HTTP_USER_AGENT"]' .
Path Traversal:
grep -Ri file_get_contents .
RATS Auditing tool for C, C++, Perl, PHP and Python