The exploit leverages an eval injection vulnerability in PHP Support Tickets v2.2, where the `getPageName()` function dynamically evaluates a user-controlled variable (`page`) without proper sanitization. By injecting arbitrary PHP code via the `page` parameter, an attacker can achieve remote code execution (RCE).
Classification
Working Poc 100%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:PHP Support Tickets v2.2
No auth needed
Prerequisites:Access to the target web application