TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

eBay remote code execution

116 pointsby knorcover 11 years ago

8 comments

tshadwellover 11 years ago
A very interesting exploit.<p>This phrase &quot;internally php strings are byte arrays. As a result accessing or modifying a string using array brackets will trick the parser into evaluating arbitrary php code in the scope of the variable if the prior mentioned requirements are met.&quot; doesn&#x27;t seem to be present in the linked documentation (<a href="http://www.php.net/manual/en/language.types.string.php" rel="nofollow">http:&#x2F;&#x2F;www.php.net&#x2F;manual&#x2F;en&#x2F;language.types.string.php</a>), however. Does anyone know what these &quot;prior mentioned requirements&quot; might be?
评论 #6916913 未加载
lednebover 11 years ago
I&#x27;m pretty sure the error is when they later take the input and eval it, and the author&#x27;s managed to dodge their filtering rather than execute arbitrary code in the context of an array-to-string cast (which I was lead to believe when reading that post, at least). Otherwise it implies that some permutation of:<p>$a = &#x27;{${phpinfo()}}&#x27;; $b = [$a]; $c = &quot;$b&quot;;<p>Will execute phpinfo()... which it won&#x27;t.
评论 #6914627 未加载
zippieover 11 years ago
A prime example of how to deal with and educate others a vulnerability.<p>Presumably the bounty was distributed without incident which is worth noting the recent threads of bounties being forfeited.
ericcholisover 11 years ago
I&#x27;m impressed by eBay&#x27;s quick turn-around for implementing a fix.
girvoover 11 years ago
Neat attack, I&#x27;d not seen this type before.<p>I wonder if doing &quot;$cast = (string) $input&quot; prior to the rest will avoid it? I do things like that, as well as making sure all methods use type hinting, which would hopefully make this harder?
martinmlover 11 years ago
More details in &#x2F;r&#x2F;netsec: <a href="http://www.reddit.com/r/netsec/comments/1sqppp/ebay_remotecodeexecution/" rel="nofollow">http:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;netsec&#x2F;comments&#x2F;1sqppp&#x2F;ebay_remoteco...</a>
joemaller1over 11 years ago
All I wanted to know was whether it was the new node.js code or the old old Java systems. I click through and get a PHP exploit? Letdown.<p>Learned something though.
ck2over 11 years ago
I&#x27;m curious if corporations like ebay respond with a grateful &quot;thank you&quot; or rather threaten to throw you in prison?
评论 #6914631 未加载