PHP Insecure Deserialization

The webapp is XVWA and has a section on PHP Object Injection.

Viewing the URL shows that there is a serialized object.

Viewing the source code of the application shows that the inject variable is directly passed to eval.

Create a php file with the code below to create a serialised object and submit it to the web application.

Now that we know the command execution works, its time for a reverse shell.

Make sure to URL encode they payload and then profit.

Last updated