# phar_dir_read()中的缓冲区溢出和过度读取漏洞
## 漏洞概述
在加载 Phar 文件时,由于 PHAR 目录项读取时长度检查不足,可能导致栈缓冲区溢出,进而引发内存破坏或远程代码执行 (RCE)。
## 影响版本
- PHP 8.0.* 早于 8.0.30
- PHP 8.1.* 早于 8.1.22
- PHP 8.2.* 早于 8.2.8
## 漏洞细节
当加载 Phar 文件并读取 PHAR 目录项时,由于长度检查不足,可能会导致栈缓冲区溢出问题。这种情况可能进一步导致内存损坏或远程代码执行。
## 漏洞影响
该漏洞可能导致内存破坏或远程代码执行 (RCE),潜在地允许攻击者在目标系统上执行任意代码。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-National-Crime-AgencyLEAK | POC详情 |
| 2 | Research of CVE-2023-3824 (NCA - Lockbit) | https://github.com/NewLockBit/Research-of-CVE-2023-3824-NCA-Lockbit | POC详情 |
| 3 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 4 | Vulnerability in PHP Phar files, due to buffer overflow, arises from insufficient length checks on file names within the Phar archive. Malicious actors can craft Phar files with long file names, leading to buffer overflow and potential execution of malicious code or data leakage. This vulnerability can be exploited for code execution CVE-2023-3824 | https://github.com/jhonnybonny/CVE-2023-3824 | POC详情 |
| 5 | None | https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 6 | None | https://github.com/Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 7 | CVE-2023-3824 | https://github.com/m1sn0w/CVE-2023-3824 | POC详情 |
| 8 | None | https://github.com/o2vi1te/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 9 | None | https://github.com/Nfttkcauzy/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 10 | None | https://github.com/Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 11 | CVE-2023-3824 PoC | https://github.com/baesh3r/poc-CVE-2023-3824 | POC详情 |
| 12 | PoC CVE 2023-3824 | https://github.com/fr33c0d3/poc-cve-2023-3824 | POC详情 |
| 13 | poc-cve-2023-3824 | https://github.com/bluefish3r/poc-cve | POC详情 |
| 14 | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. | https://github.com/exploitdevelop/CVE-2023-3824 | POC详情 |
| 15 | None | https://github.com/dadosneurais/cve-2023-3824 | POC详情 |
暂无评论