webmedium

POP Restaurant

hackthebox

Task: Achieve RCE on a PHP food ordering application. Solution: Exploit unserialize() on user-controlled POST data by crafting a POP chain: Pizza.__destruct() triggers Spaghetti.__get() triggers IceCream.__invoke() triggers ArrayHelpers.current() which calls call_user_func("system", command) for arbitrary command execution.

$ ls tags/ techniques/
php_object_injectionpop_chaininsecure_deserializationcall_user_func_rce

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]