php5.4.3的远程代码执行漏洞,提权挺管用

PHP com_print_typeinfo()的漏洞,通过PHP代码调用”exec”可运行SHELL命令
用这个提权是不是很方便了?

// Exploit Title: PHP 5.4 (5.4.3) Code Execution 0day (Win32)
// Exploit author: 0in (Maksymilian Motyl)
// Email: 0in(dot)email(at)gmail.com
// * Bug with Variant type parsing originally discovered by Condis
// Tested on Windows XP SP3 fully patched (Polish)
===================
offset-brute.html
===================

0day


PHP 5.4.3 0day by 0in & cOndis