source: https://www.securityfocus.com/bid/31064/info PHP is prone to 'safe_mode_exec_dir' and 'open_basedir' restriction-bypass vulnerabilities. Successful exploits could allow an attacker to execute arbitrary code. These vulnerabilities would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; in such cases, the 'safe_mode' and 'open_basedir' restrictions are expected to isolate users from each other. PHP 5.2.5 is vulnerable; other versions may also be affected. for "exec" test php poc.php 2 => for "system" test php poc.php 3 => for "shell_exec" test php poc.php 4 => for "passthru" test php poc.php 5 => for "popen" test php poc.php 6 => for "all in one" test -------------------------------------- '); } ?>