You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi.md
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
8
8
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
9
9
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
10
10
***Join the**[**💬**](https://emojipedia.org/speech-balloon/)[**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter**[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
11
-
***Share your hacking tricks by submitting PRs to the[hacktricks repo](https://github.com/carlospolop/hacktricks) and[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
11
+
***Share your hacking tricks by submitting PRs to the**[**hacktricks repo**](https://github.com/carlospolop/hacktricks)**and**[**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud).
12
12
13
13
</details>
14
14
@@ -427,7 +427,7 @@ Using the previous function you will see that the function **`system`** is **sti
427
427
428
428
This is a php script to exploit fastcgi protocol to bypass `open_basedir` and `disable_functions`.\
429
429
It will help you to bypass strict `disable_functions` to RCE by loading the malicious extension.\
430
-
You can access it here: [https://github.com/w181496/FuckFastcgi](https://github.com/w181496/FuckFastcgi)
430
+
You can access it here: [https://github.com/w181496/FuckFastcgi](https://github.com/w181496/FuckFastcgi) or a sligtly modified and improved version here: [https://github.com/BorelEnzo/FuckFastcgi](https://github.com/BorelEnzo/FuckFastcgi)
431
431
432
432
You will find that the exploit is very similar to the previous code, but instead of trying to bypass `disable_functions` using PHP\_VALUE, it tries to **load an external PHP module** to execute code using the parameters `extension_dir` and `extension` inside the variable `PHP_ADMIN_VALUE`.\
433
433
**NOTE1**: You probably will need to **recompile** the extension with the **same PHP version that the server** is using (you can check it inside the output of phpinfo):
@@ -445,12 +445,12 @@ You can also find an analysis of the vulnerability [**here**](https://medium.com
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
451
451
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
452
452
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
453
453
***Join the**[**💬**](https://emojipedia.org/speech-balloon/)[**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter**[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
454
-
***Share your hacking tricks by submitting PRs to the[hacktricks repo](https://github.com/carlospolop/hacktricks) and[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
454
+
***Share your hacking tricks by submitting PRs to the**[**hacktricks repo**](https://github.com/carlospolop/hacktricks)**and**[**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud).
0 commit comments