PHP Code Review Basics

R3zk0n · October 2, 2025

Contents

    PHP Playgrounds

    Visit these websites to assist with understanding PHP code!

    • https://3v4l.org/a1PLP
    • https://www.tehplayground.com/

    WordPress Cheat Sheet

    • https://github.com/wpscanteam/wpscan/wiki/WordPress-Plugin-Security-Testing-Cheat-Sheet

    Regex


    Grep Commands

    Use grep to find potential areas of interest. Flags include:

    -r              - Recursive
    -e              - Search for patterns (regexp)
    -w              - Select matches for whole words
    -f              - From file
    -n              - Prefix each line of output with line number within its input file
    -i              - Ignore case (Case sensitive)
    -G | -E | -P    - Basic, Extended and Perl regexp
    --color         - Colors
    -L | -l         - File without|with matches
    

    Example Greps

    # Unauthenticated Flow
    grep -rnw /var/www/html/ATutor -e "^.*user_location.*public.*" --color
    
    # Interesting Functions
    grep -rnw /var/www/html/ATutor -e "function searchFriends" --color
    
    # Input Sanitization
    grep -rnw /var/www/html/ATutor -e "\$addslashes.*=" --color
    
    # Specific Text
    grep -ir "IMS manifest file is missing" /var/www/html/ATutor --color
    grep -ir "addError(" /var/www/html/ATutor --color
    grep -ir "NO_IMSMANIFEST" /var/www/html/ATutor --color
    

    Command Execution

    # Python Search String
    re.search(r'(exec|system|shell_exec|popen|passthru|proc_open|pcntl_exec|ssh_exec|ssh2_exec)\(.*(escapeshellarg|escapeshellcmd)\(.*[\$].+\).*\)'
    
    # Standard Functions
    exec             - Returns last line of commands output
    passthru         - Passes commands output directly to the browser
    system           - Passes commands output directly to the browser and returns last line
    shell_exec       - Returns commands output
    \`\` (backticks) - Same as shell_exec()
    popen            - Opens read or write pipe to process of a command
    proc_open        - Similar to popen() but greater degree of control
    pcntl_exec       - Executes a program
    
    # Dynamic Invocations
    $variable()
    $$variable()
    call_user_func()
    call_user_func_array()
    

    Exploiting and bypassing escapeshellarg/escapeshellcmd functions

    • grep -r "(escapeshellarg|escapeshellcmd)"
    • https://github.com/kacperszurek/exploits/blob/master/GitList/exploit-bypass-php-escapeshellarg-escapeshellcmd.md

    PHP Code Execution

    Apart from eval there are other ways to execute PHP code: include/require can be used for remote code execution in the form of Local File Include and Remote File Include vulnerabilities.

    assert()  - identical to eval()
    preg_replace('/.*/e',...) - /e does an eval() on the match
    create_function()
    include()
    include_once()
    require()
    require_once()
    $_GET['func_name']($_GET['argument']);
    $func = new ReflectionFunction($_GET['func_name']); $func->invoke(); or $func->invokeArgs(array());
    

    Credentials

    (pwd|pass|key|secret|token)
    hash_hmac              - Generate a keyed hash value using the HMAC method (https://www.securify.nl/blog/spot-the-bug-challenge-2018-warm-up/)
    sign($_GET["data"]) === $_GET["signature"]) - if sign() uses hash_hmac, can have the second value become null
    sign($_GET["data"]) == $_GET["signature"]) - if sign() uses hash_hmac, loose comparison can allow null == ""
    

    SQL Injection

    # Using Grep
    grep -irE 'select .* from .* id.=.*\$id`
    
    # Standard Functions
    get_magic_quotes_gpc   - When magic_quotes are on, all ' (single-quote), " (double quote), \ (backslash) and NULs are escaped
    mysql_error            - Returns the text of the error message from previous MySQL operation
    addslashes             - Quote string with slashes
    
    esc_sql                - Escape values to be used in strings in the query (WordPress)
    esc_like               - First half of escaping for LIKE special characters % and _ before preparing for SQL (WordPress)
    addslashes\(
    wpdb->(query|get_var|get_row|get_col|get_results|replace)\((?!.*prepare).*\);
                           - WordPress generic regex payload
    
    # Python Regex Search
    r'(mysqli?_|\->)query\(("|\').*[\$].+("|\')\)', False)'
    

    Regex

    preg_replace           - Perform a regular expression search and replace
    preg_match             - Perform a regular expression match
    

    Type Juggling (Loose Comparison)

    in_array               - Checks if a value exists in an array (bool $strict = false)
    md5(                   - Calculate the md5 hash of a string
    sha1(                  - Calculate the sha1 hash of a string
    

    Cross Site Scripting

    htmlentities           - Convert all applicable characters to HTML entities
    htmlspecialchars       - Convert special characters to HTML entities
    mysql_error            - Returns the text of the error message from previous MySQL operation (XSS in error message)
    

    Sources

    GET|POST|DELETE|PUT|PATCH|OPTIONS
    $this->request->query
    
    # Regex Search Strings (VSCode - unverified)
    \$_(GET|POST)\[.*\] +(>|<|=)=?
    \$_(GET|POST)\[.*?\] *== *
    == *\$_(GET|POST)\[.*?\]
    \$_(GET|POST)\[.*\] *\=\= *\$_(GET|POST)\[.*\]
    

    Server-Side Request Forgery

    parse_url
    

    Unauthenticated Deletion

    unlink
    

    Others

    # Capitalisation Bypass
    if(strpos($_POST['[image_location]'], 'http') !== false)    - Can be bypassed with 'HTTP' to evaluate to false
    

    WordPress

    wp_ajax_nopriv                                              - No privilege admin_ajax calls
    add_action                                                  - Action callback
    add_filter                                                  - Add filter callback
    admin_init
    

    List of functions which accept callbacks

    These functions accept a string parameter which could be used to call a function of the attacker’s choice. Depending on the function the attacker may or may not have the ability to pass a parameter. In that case an Information Disclosure function like phpinfo() could be used.

    Function                     => Position of callback arguments
    'ob_start'                   =>  0,
    'array_diff_uassoc'          => -1,
    'array_diff_ukey'            => -1,
    'array_filter'               =>  1,
    'array_intersect_uassoc'     => -1,
    'array_intersect_ukey'       => -1,
    'array_map'                  =>  0,
    'array_reduce'               =>  1,
    'array_udiff_assoc'          => -1,
    'array_udiff_uassoc'         => array(-1, -2),
    'array_udiff'                => -1,
    'array_uintersect_assoc'     => -1,
    'array_uintersect_uassoc'    => array(-1, -2),
    'array_uintersect'           => -1,
    'array_walk_recursive'       =>  1,
    'array_walk'                 =>  1,
    'assert_options'             =>  1,
    'uasort'                     =>  1,
    'uksort'                     =>  1,
    'usort'                      =>  1,
    'preg_replace_callback'      =>  1,
    'spl_autoload_register'      =>  0,
    'iterator_apply'             =>  1,
    'call_user_func'             =>  0,
    'call_user_func_array'       =>  0,
    'register_shutdown_function' =>  0,
    'register_tick_function'     =>  0,
    'set_error_handler'          =>  0,
    'set_exception_handler'      =>  0,
    'session_set_save_handler'   => array(0, 1, 2, 3, 4, 5),
    'sqlite_create_aggregate'    => array(2, 3),
    'sqlite_create_function'     =>  2,
    

    Information Disclosure

    Most of these function calls are not sinks. But rather it maybe a vulnerability if any of the data returned is viewable to an attacker. If an attacker can see phpinfo() it is definitely a vulnerability.

    phpinfo
    posix_mkfifo
    posix_getlogin
    posix_ttyname
    getenv
    get_current_user
    proc_get_status
    get_cfg_var
    disk_free_space
    disk_total_space
    diskfreespace
    getcwd
    getlastmo
    getmygid
    getmyinode
    getmypid
    getmyuid
    

    Other

    extract - Opens the door for register_globals attacks (see study in scarlet).
    parse_str -  works like extract if only one argument is given.  
    putenv
    ini_set
    mail - has CRLF injection in the 3rd parameter, opens the door for spam. 
    header - on old systems CRLF injection could be used for xss or other purposes, now it is still a problem if they do a header("location: ..."); and they do not die();. The script keeps executing after a call to header(), and will still print output normally. This is nasty if you are trying to protect an administrative area. 
    proc_nice
    proc_terminate
    proc_close
    pfsockopen
    fsockopen
    apache_child_terminate
    posix_kill
    posix_mkfifo
    posix_setpgid
    posix_setsid
    posix_setuid
    

    Filesystem Functions

    According to RATS all filesystem functions in php are nasty. Some of these don’t seem very useful to the attacker. Others are more useful than you might think. For instance if allow_url_fopen=On then a url can be used as a file path, so a call to copy($_GET[’s’], $_GET[‘d’]); can be used to upload a PHP script anywhere on the system. Also if a site is vulnerable to a request send via GET everyone of those file system functions can be abused to channel and attack to another host through your server.

    // open filesystem handler
    fopen
    tmpfile
    bzopen
    gzopen
    SplFileObject->__construct
    // write to filesystem (partially in combination with reading)
    chgrp
    chmod
    chown
    copy
    file_put_contents
    lchgrp
    lchown
    link
    mkdir
    move_uploaded_file
    rename
    rmdir
    symlink
    tempnam
    touch
    unlink
    imagepng   - 2nd parameter is a path.
    imagewbmp  - 2nd parameter is a path. 
    image2wbmp - 2nd parameter is a path. 
    imagejpeg  - 2nd parameter is a path.
    imagexbm   - 2nd parameter is a path.
    imagegif   - 2nd parameter is a path.
    imagegd    - 2nd parameter is a path.
    imagegd2   - 2nd parameter is a path.
    iptcembed
    ftp_get
    ftp_nb_get
    // read from filesystem
    file_exists
    file_get_contents
    file
    fileatime
    filectime
    filegroup
    fileinode
    filemtime
    fileowner
    fileperms
    filesize
    filetype
    glob
    is_dir
    is_executable
    is_file
    is_link
    is_readable
    is_uploaded_file
    is_writable
    is_writeable
    linkinfo
    lstat
    parse_ini_file
    pathinfo
    readfile
    readlink
    realpath
    stat
    gzfile
    readgzfile
    getimagesize
    imagecreatefromgif
    imagecreatefromjpeg
    imagecreatefrompng
    imagecreatefromwbmp
    imagecreatefromxbm
    imagecreatefromxpm
    ftp_put
    ftp_nb_put
    exif_read_data
    read_exif_data
    exif_thumbnail
    exif_imagetype
    hash_file
    hash_hmac_file
    hash_update_file
    md5_file
    sha1_file
    highlight_file
    show_source
    php_strip_whitespace
    get_meta_tags
    

    Twitter, Facebook