PHP Dev
damienseguy's profile
Damien seguy@damienseguy•Mar 03
21.2K
Exakat's profile
Post cover image

GitHub - m0x41nos/TimeAfterFree: PHP 8 Sandbox Escape

From github.com•Mar 03•1m read time

A proof-of-concept exploit demonstrating a PHP 8 sandbox escape via a use-after-free vulnerability. The exploit bypasses `disable_functions` restrictions on Unix-like systems by leveraging the `DateInterval` object to leak heap pointers and gain read/write primitives. It affects PHP 8.2.x through 8.5.x and reproduces deterministically across CLI, PHP-FPM, and Apache module environments. The author notes that relying on `disable_functions` as a security boundary is insufficient given PHP's memory-unsafe nature.

1 Comment

Sort:

damienseguy's user avatar
Damien seguy
@damienseguy
Joined Oct 25. 2023
21.2K
Exakat's profile

Exakat

Verified

PHP developer passionate about deep language knowledge, testing, static analysis, and sustainable it

Would you recommend this post?

Copy link
WhatsApp
Facebook
X
New Squad
  • © 2026 Daily Dev Ltd.
  • Guidelines
  • Explore
  • Tags
  • Sources
  • Squads
  • Leaderboard