php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #25718 stack over flow
Submitted: 2003-10-01 12:43 UTC Modified: 2003-10-01 14:28 UTC
From: net_del at freemail dot ru Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 4.3.3 OS: Win32
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: net_del at freemail dot ru
New email:
PHP Version: OS:

 

 [2003-10-01 12:43 UTC] net_del at freemail dot ru
Description:
------------
This code over flow the apache!

Reproduce code:
---------------
eval($apache_fuck);
echo("
<form method='post'>
<input type='hidden' name='apache_fuck' value='eval(".chr(36)."apache_fuck);'>
<input type='submit' value='Save the planet kill the apache'></form></font></td>");

Expected result:
----------------
;)while (true) but no error ;P

Actual result:
--------------
Apache.exe errored

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2003-10-01 14:28 UTC] pollita@php.net
Please do not submit the same bug more than once. An existing
bug report already describes this very problem. Even if you feel
that your issue is somewhat different, the resolution is likely
to be the same. Because of this, we hope you add your comments
to the existing bug instead.

Thank you for your interest in PHP.

Bug #25717
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue May 07 11:01:31 2024 UTC