Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed
eval-stdin.php flagged as malware. Closed (outdated). Project
לא נמצאו תוצאות עבור הביטוי החלמה/vendor/phpunit/phpunit/src/Util/PHP//images/editor/separator.gif/scratchwin-backend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.
I copy/pasted those src/Email.php and tests/EmailTest.php code sources. My problem is when I try to run ./phpunit --bootstrap src/autoload.php tests/EmailTest. The documentation says I must create that src/autoload.php, so I followed the first example mentioned here("Autoloading Classes")
The file eval-stdin.php was added to PHPUnit in November 2015 in order to be able to run tests in
no eval-stdin.php file there in my case. eval-stdin.php is the file responsible for the issue.
Инструкция по тестированию кода с PHPUnit для чайников. Основные приёмы автоматизированного тестирования для начинающих.
Poc: Laravel framework phpunit rce Vulnerable point: /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php...
Apache/2.4.33 (Win64) PHP/7.2.4 Server at gnerc.ge Port 80.