Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2017-9841
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHPUnit 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TYPO3是瑞士TYPO3协会维护的一套免费开源的内容管理系统。PHPUnit是其中的一个基于PHP的测试框架。 PHPUnit 4.8.28之前的版本和5.6.3之前的5.x版本中的Util/PHP/eval-stdin.php文件存在安全漏洞。远程攻击者可通过发送以‘<?php’字符串开头的HTTP POST数据利用该漏洞执行任意PHP代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2017-9841
#POC DescriptionSource LinkShenlong Link
1CVE-2017-9841 detector scripthttps://github.com/mbrasile/CVE-2017-9841POC Details
2Tool to try multiple paths for PHPunit RCE CVE-2017-9841https://github.com/RandomRobbieBF/phpunit-brutePOC Details
3Nonehttps://github.com/cyberharsh/Php-unit-CVE-2017-9841POC Details
4(CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Executionhttps://github.com/ludy-dev/PHPUnit_eval-stdin_RCEPOC Details
5Masscanner for Laravel phpunit RCE CVE-2017-9841https://github.com/incogbyte/laravel-phpunit-rce-masscanerPOC Details
6RCE exploit for PHP Unit 5.6.2https://github.com/akr3ch/CVE-2017-9841POC Details
7phpunit-shell | CVE_2017-9841https://github.com/p1ckzi/CVE-2017-9841POC Details
8CVE-2017-9841批量扫描及利用脚本。PHPUnit是其中的一个基于PHP的测试框架。 PHPUnit 4.8.28之前的版本和5.6.3之前的5.x版本中的Util/PHP/eval-stdin.php文件存在安全漏洞。远程攻击者可通过发送以‘<?php’字符串开头的HTTP POST数据利用该漏洞执行任意PHP代码。https://github.com/jax7sec/CVE-2017-9841POC Details
9Nonehttps://github.com/yoloskr/CVE-2017-9841-ScanPOC Details
10Automated Exploit for CVE-2017-9841 (eval-stdin.php vulnerable file)https://github.com/mileticluka1/eval-stdinPOC Details
11Nonehttps://github.com/Jhonsonwannaa/CVE-2017-9841-POC Details
12PHPunit Checker CVE-2017-9841 By MrMadhttps://github.com/MadExploits/PHPunit-ExploitPOC Details
13A Tool for scanning CVE-2017-9841 with multithreadhttps://github.com/MrG3P5/CVE-2017-9841POC Details
14PHPUnit RCEhttps://github.com/Chocapikk/CVE-2017-9841POC Details
15Nonehttps://github.com/omgdomgd/CVE-2017-9841-ScanPOC Details
16Nonehttps://github.com/dream434/CVE-2017-9841-POC Details
17CVE-2017-9841https://github.com/dream434/CVE-2017-9841POC Details
18PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring via Util/PHP/eval-stdin.php , as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9841.yamlPOC Details
19Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/PHPUnit%20eval-stdin.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-9841.mdPOC Details
20Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/phpunit-cve-2017-9841-rce.ymlPOC Details
21https://github.com/vulhub/vulhub/blob/master/phpunit/CVE-2017-9841/README.mdPOC Details
22A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOITPOC Details
23"Argus" is a security tool designed to scan a list of websites for a known vulnerability in the PHPUnit framework, specifically the CVE-2017-9841 vulnerability. The tool attempts to exploit this vulnerability to verify its existence.https://github.com/joelindra/ArgusPOC Details
24PHPUnit CVE-2017-9841 Scanner in Go clean and fire.https://github.com/drcrypterdotru/PHPUnit-GoScanPOC Details
25Nonehttps://github.com/Pwdnx1337/CVE-2017-9841POC Details
26🛡️ Scan for vulnerable PHPUnit endpoints quickly with this fast, multithreaded tool, ensuring your applications stay secure against CVE-2017-9841.https://github.com/Habibullah1101/PHPUnit-GoScanPOC Details
27Tool designed to scan a list of websites for a known vulnerability in the PHPUnit framework, specifically the CVE-2017-9841 vulnerability.https://github.com/joelindra/CVE-2017-9841POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2017-9841
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2017-9841

No comments yet


Leave a comment