Successful exploitability of this vulnerability is pretty hard as you need both a vulnerable application (though i’ve found a few in google code search) and a vulnerable php set up. I was able to find a exploitable set up though. I’ll present a demo on my blog once new PHP will be released.
↧