This exploit demonstrates a use-after-free vulnerability in PHP's unserialize() function with GMP objects, allowing arbitrary memory manipulation and potential remote code execution. The PoC constructs a malicious serialized string that triggers the vulnerability, enabling control over freed memory.
Classification
Working Poc 100%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:PHP 5.6 < 5.6.13
No auth needed
Prerequisites:PHP 5.6 < 5.6.13 with GMP extension enabled