# N/A
## 漏洞概述
PHPUnit中的`eval-stdin.php`文件存在一处远程代码执行漏洞,攻击者可以通过POST数据注入PHP代码来利用此漏洞。
## 影响版本
- PHPUnit 4.8.0 到 4.8.27
- PHPUnit 5.x 到 5.6.2
## 漏洞细节
攻击者可以通过向`/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php`文件发送以`<?php`开头的POST数据,注入并执行任意PHP代码。漏洞主要影响那些暴露了`/vendor`文件夹的站点。
## 影响
此类漏洞允许远程攻击者执行任意PHP代码,可能导致数据泄露、服务器控制权滥用等严重后果。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2017-9841 detector script | https://github.com/mbrasile/CVE-2017-9841 | POC详情 |
| 2 | Tool to try multiple paths for PHPunit RCE CVE-2017-9841 | https://github.com/RandomRobbieBF/phpunit-brute | POC详情 |
| 3 | None | https://github.com/cyberharsh/Php-unit-CVE-2017-9841 | POC详情 |
| 4 | (CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Execution | https://github.com/ludy-dev/PHPUnit_eval-stdin_RCE | POC详情 |
| 5 | Masscanner for Laravel phpunit RCE CVE-2017-9841 | https://github.com/incogbyte/laravel-phpunit-rce-masscaner | POC详情 |
| 6 | RCE exploit for PHP Unit 5.6.2 | https://github.com/akr3ch/CVE-2017-9841 | POC详情 |
| 7 | phpunit-shell | CVE_2017-9841 | https://github.com/p1ckzi/CVE-2017-9841 | POC详情 |
| 8 | CVE-2017-9841批量扫描及利用脚本。PHPUnit是其中的一个基于PHP的测试框架。 PHPUnit 4.8.28之前的版本和5.6.3之前的5.x版本中的Util/PHP/eval-stdin.php文件存在安全漏洞。远程攻击者可通过发送以‘<?php’字符串开头的HTTP POST数据利用该漏洞执行任意PHP代码。 | https://github.com/jax7sec/CVE-2017-9841 | POC详情 |
| 9 | None | https://github.com/yoloskr/CVE-2017-9841-Scan | POC详情 |
| 10 | Automated Exploit for CVE-2017-9841 (eval-stdin.php vulnerable file) | https://github.com/mileticluka1/eval-stdin | POC详情 |
| 11 | None | https://github.com/Jhonsonwannaa/CVE-2017-9841- | POC详情 |
| 12 | PHPunit Checker CVE-2017-9841 By MrMad | https://github.com/MadExploits/PHPunit-Exploit | POC详情 |
| 13 | A Tool for scanning CVE-2017-9841 with multithread | https://github.com/MrG3P5/CVE-2017-9841 | POC详情 |
| 14 | PHPUnit RCE | https://github.com/Chocapikk/CVE-2017-9841 | POC详情 |
| 15 | None | https://github.com/omgdomgd/CVE-2017-9841-Scan | POC详情 |
| 16 | None | https://github.com/dream434/CVE-2017-9841- | POC详情 |
| 17 | CVE-2017-9841 | https://github.com/dream434/CVE-2017-9841 | POC详情 |
| 18 | PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring via Util/PHP/eval-stdin.php , as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9841.yaml | POC详情 |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/PHPUnit%20eval-stdin.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-9841.md | POC详情 |
| 20 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/phpunit-cve-2017-9841-rce.yml | POC详情 |
| 21 | https://github.com/vulhub/vulhub/blob/master/phpunit/CVE-2017-9841/README.md | POC详情 | |
| 22 | A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE) | https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOIT | POC详情 |
| 23 | "Argus" is a security tool designed to scan a list of websites for a known vulnerability in the PHPUnit framework, specifically the CVE-2017-9841 vulnerability. The tool attempts to exploit this vulnerability to verify its existence. | https://github.com/joelindra/Argus | POC详情 |
| 24 | PHPUnit CVE-2017-9841 Scanner in Go clean and fire. | https://github.com/drcrypterdotru/PHPUnit-GoScan | POC详情 |
| 25 | None | https://github.com/Pwdnx1337/CVE-2017-9841 | POC详情 |
| 26 | 🛡️ Scan for vulnerable PHPUnit endpoints quickly with this fast, multithreaded tool, ensuring your applications stay secure against CVE-2017-9841. | https://github.com/Habibullah1101/PHPUnit-GoScan | POC详情 |
暂无评论