diff --git a/tanner/emulators/php_object_injection.py b/tanner/emulators/php_object_injection.py index 9621763b..6c20bb87 100644 --- a/tanner/emulators/php_object_injection.py +++ b/tanner/emulators/php_object_injection.py @@ -12,6 +12,11 @@ def __init__(self, loop=None): self.helper = PHPSandboxHelper(self._loop) async def get_injection_result(self, code): + """ + Injects the code from attacker to vulnerable code and get emulation results from php sandbox. + :param code (str): Input payload from attacker + :return: object_injection_result (dict): file_md5 (md5 hash), stdout (injection result) as keys. + """ vul_code = "