knightoverlord / owasp-hackademic-challenges

Automatically exported from code.google.com/p/owasp-hackademic-challenges
0 stars 0 forks source link

Challenge 9 #1

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
There are no hints or directions provided to indicate that the page is 
vulnerable by changing the USER AGENT to exploit PHP code execution.  The PHP 
version the headers are showing appears to be up-to-date, and no application 
data is given to indicate a vulnerable program.  The only real way to complete 
the challenge is by using the provided PHP source code, which is falls outside 
the bounds of a true-to-life exercise.

Original issue reported on code.google.com by GuitarJ87 on 26 Apr 2011 at 6:01

GoogleCodeExporter commented 8 years ago
Agreed. There's no reason for anyone to try this. 

Yes one of the first challenges talks about editing the UA and another deals 
with OS commands but there is absolutely no bridge between those and this 
content.

Original comment by kingtho...@gmail.com on 27 May 2011 at 6:01