We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
.=
uname -a
python -V
python kunlun.py
When dealing with php variable declaration, .= format is not recoginzed correctly.
example vulnerable code:
<?php $cmd = "/usr/local/1.php"; $cmd .= " " . $_GET ["pass"]; exec ( $cmd . " > /dev/null &" ); ?>
Expected behavior: Function-param-controllable
Actual behavior:
[01:50:38] [!] Start scan [CVI-1011] [01:50:38] [ENGINE] [ORIGIN] match-mode function-param-regex [01:50:38] [CVI-1011] [ORIGIN] /tmp/test.php: 4: exec ( $cmd . " > /dev/null &" ) [01:50:38] [CVI-1011] [VERIFY-VULNERABILITY] (0) > File: `/tmp/test.php:4` > Code: `exec ( $cmd . " > /dev/null &" )` [01:50:38] [CVI-1011] match-mode function-param-regex [01:50:38] [AST] [LANGUAGE] php [01:50:38] [RULE_MATCH] ['system', 'passthru', 'exec', 'pcntl_exec', 'shell_exec', 'popen', 'proc_open', 'ob_start', 'expect_popen', 'mb_send_mail', 'w32api_register_function', 'w32api_invoke_function', 'ssh2_exec'] [01:50:38] [AST] vul_function:exec [01:50:38] [AST] AST to find param Variable('$cmd') [01:50:38] [AST] Find $cmd=/usr/local/1.php in line 0, start ast for param /usr/local/1.php [01:50:38] [AST] [RET] [] [01:50:38] [AST] Parser failed / vulnerability parameter is not controllable [] [01:50:38] Not vulnerability: Can't parser [01:50:38] [CVI-1011] RCE Vulnerabilities: 0
The text was updated successfully, but these errors were encountered:
暂时把这个语法支持加上了,但是这部分语义分析其实有很多特殊语法没有支持,不太好弄,本来打算重构成正向的。但是感觉时间成本有点儿大,暂时不弄了
Sorry, something went wrong.
3f84401
No branches or pull requests
System and Python Environment
uname -a
python -V
python kunlun.py
Description
When dealing with php variable declaration,
.=
format is not recoginzed correctly.Steps to Reproduce
example vulnerable code:
Expected behavior: Function-param-controllable
Actual behavior:
The text was updated successfully, but these errors were encountered: