exploit-db-mirror/exploits/php/dos/44768.txt
Offensive Security d63de06c7a DB: 2022-11-10
2776 changes to exploits/shellcodes/ghdb
2022-11-10 16:39:50 +00:00

12 lines
No EOL
614 B
Text

The PDOSessionHandler class allows to store sessions on a PDO connection. Under some configurations (see below) and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
An application is vulnerable when:
- It is using PDOSessionHandler to store its sessions;
- And it uses MySQL as a backend for sessions managed by PDOSessionHandler;
- And the SQL mode does not contain STRICT_ALL_TABLES or STRICT_TRANS_TABLES (check via SELECT @@sql_mode).
POC:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44768.tgz