Course
In this lab, we explore the dangers of the <code>PCRE_REPLACE_EVAL</code> modifier in PHP and how it can lead to remote code execution. By understanding how <code>preg_replace</code> evaluates new values as PHP code, you will learn to identify and mitigate such vulnerabilities.
Skills covered
Injection
Operating System
CWE-477, CWE-1336
Included with PRO
Full course content
2 videos
Common mistakes
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.