As the title says, this bug is useful only for post exploitation to bypass protections when the attacker already has arbitrary PHP...