What overspill test-PHP code in the browser reveals about internal PHP workings?

L.S.

Also hackers go a error-hunting, folks, for the info it potentially may reveal. :smiley:

We just elaborate on this x-hacker scheme via a test PHP page.
Should never be allowed to enter the client, nor even seen in production code.
But to explain potentially suspicious and insecure code it serves a purpose :wink:

We stumbled upon it here, this just in coincidence,
see: -https://pglawyers.wordpress.com/test/

Not enough data about -pglawyers.wordpress.com was found to be able to run tests.
Parent domain ‘wordpress.com’ was found for the tested domain.
Server info proliferation here: https://www.shodan.io/host/192.0.78.13

Moreover uMatrix has prevented the following page from loading:

-https://c0.pubmine.com/2.14.01591698572968/ata.js
Re: Results from scanning URL: -https://c0.pubmine.com/2.14.01591698572968/ata.js
Number of sources found: 42
Number of sinks found: 20

with an external link, resulting in scanning URL: -https://login.proxy.uwec.edu/public/templateApplication.js
(tracking reloads code)
Number of sources found: 43
Number of sinks found: 19

Consider that PHP-error-test code should never be tolerated as production code,
as it could reveal to an attacker how internal PHP may tick.

Another example provides this error-code.
See this example:

<?php
error_reporting(E_ALL); @ini_set(‘display_errors’, true);
$pages = array(
‘0’ => array(‘id’ => ‘1’, ‘alias’ => ‘#home’, ‘file’ => ‘1.php’,‘controllers’ => array())
);
$forms = array(

);</blockquote> where 1.php schould be considered as suspicious. (info credits go to: luntrus)

Also read on here on weak and suspicious PHP-code: https://stackoverflow.com/questions/25644235/suspicious-php-code
PHP in PHP-based CMS could really mean entering a code-minefield, when things spill over from server to client-side. :o

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

The following is a PHISH and also into password stealing:
https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=c3R7dntuc2IjLl5dbWBse3NsW3tgW24je3gucGhw~enc

See this confirmed here: https://www.phishtank.com/phish_detail.php?phish_id=6652388

See: Results from scanning URL: -http://stevensbd.com/leslie/index.php
Number of sources found: 4
Number of sinks found: 28

Opens up -http://stevensbd.com/leslie/action_page.php

(not secure?)...

polonus

P.S. test.php insecure - php code examples: https://hotexamples.com/search
open source quality example:
https://hotexamples.com/examples/genesis.commands.test/Php/-/php-php-class-examples.html

To test functions online - sandbox ->: http://onlinephpfunctions.com/

D