tomvangoethem / poi-fuzz

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Warning: contains crappy code

POI-Fuzz

The goal of this little tool is to find (additional entry points to) chains that can be used in a PHP Object Injection exploit, with just built-in classes (in PHP versions before 5.6.12, 5.5.28, and 5.4.4, this could be done by chaining DateTime::date (which triggers __toString(), Exception::previous (which triggers __call()) and SoapClient (which could be used to perform XXE).

Run

You can run the fuzzer like this:

php fuzz.php 2>/dev/null | grep -v '^---' | sort -u

Limitations/Todo

  • Only fuzzes "top-level" object properties
  • Very naive fuzzing method (replacing one object property at a time)
  • Only tries unserialization of classes that can be serialized
  • Only tries fuzzing of classes that were "easy" to instantiate (e.g. only a non-WSDL version of SoapClient gets fuzzed)

About


Languages

Language:PHP 100.0%