支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2024-4577 基础信息
漏洞信息
                                        # PHP-CGI的参数注入漏洞

## 漏洞概述
在特定版本的PHP中,当使用Apache和PHP-CGI在Windows系统上运行时,如果系统设置使用某些代码页,Windows可能采用“Best-Fit”行为来替换命令行中传递给Win32 API函数的字符。这可能导致PHP CGI模块误将这些字符解释为PHP选项,从而使恶意用户能够向运行的PHP二进制文件传递选项,进而可能泄露脚本源代码或在服务器上执行任意PHP代码。

## 影响版本
- PHP 8.1.x 版本:8.1.0至8.1.28
- PHP 8.2.x 版本:8.2.0至8.2.19
- PHP 8.3.x 版本:8.3.0至8.3.7

## 细节
当系统配置使用某些代码页时,Windows会采用"Best-Fit"策略来替换传递给Win32 API函数中的字符。这可能导致PHP CGI模块将某些字符误判为PHP选项。恶意用户可通过这种方式向PHP二进制文件传递额外选项,从而对服务器进行进一步攻击。

## 影响
- 泄露脚本源代码
- 在服务器上执行任意PHP代码
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Argument Injection in PHP-CGI
来源:美国国家漏洞数据库 NVD
漏洞描述信息
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
来源:美国国家漏洞数据库 NVD
漏洞标题
PHP 操作系统命令注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
PHP是一种在服务器端执行的脚本语言。 PHP存在操作系统命令注入漏洞,该漏洞源于在特定条件下,Windows系统使用“Best-Fit”行为替换命令行中的字符,这可能导致PHP CGI模块错误地将这些字符解释为PHP选项,从而泄露脚本的源代码,在服务器上运行任意PHP代码等。以下版本受到影响:8.1至8.1.29之前版本,8.3至8.3.8之前版本,8.2至8.2.20之前版本。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
授权问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-4577 的公开POC
#POC 描述源链接神龙链接
1CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.https://github.com/TAM-K592/CVE-2024-4577POC详情
2CVE-2024-4577https://github.com/ohhhh693/CVE-2024-4577POC详情
3PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/Junp0/CVE-2024-4577POC详情
4Nonehttps://github.com/princew88/CVE-2024-4577POC详情
5POC & $BASH script for CVE-2024-4577https://github.com/11whoami99/CVE-2024-4577POC详情
6PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/watchtowrlabs/CVE-2024-4577POC详情
7CVE-2024-4577https://github.com/zjhzjhhh/CVE-2024-4577POC详情
8Nonehttps://github.com/huseyinstif/CVE-2024-4577-Nuclei-TemplatePOC详情
9Nonehttps://github.com/taida957789/CVE-2024-4577POC详情
10Nonehttps://github.com/Wh02m1/CVE-2024-4577POC详情
11Nuclei Template for CVE-2024-4577https://github.com/Sysc4ll3r/CVE-2024-4577POC详情
12Nonehttps://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXPPOC详情
13Nonehttps://github.com/Yukiioz/CVE-2024-4577POC详情
14CVE-2024-4577 nuclei-templateshttps://github.com/0x20c/CVE-2024-4577-nucleiPOC详情
15Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.https://github.com/manuelinfosec/CVE-2024-4577POC详情
16CVE-2024-4577 Exploit POC https://github.com/zomasec/CVE-2024-4577POC详情
17PoC for CVE-2024-4577 written in bash, go, python and a nuclei templatehttps://github.com/ZephrFish/CVE-2024-4577-PoCPOC详情
18PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei templatehttps://github.com/ZephrFish/CVE-2024-4577-PHP-RCEPOC详情
19[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.https://github.com/xcanwin/CVE-2024-4577-PHP-RCEPOC详情
20python poc编写练手,可以对单个目标或批量检测https://github.com/dbyMelina/CVE-2024-4577POC详情
21PHP CGI Argument Injection vulnerabilityhttps://github.com/Chocapikk/CVE-2024-4577POC详情
22A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOITPOC详情
23Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerabilityhttps://github.com/it-t4mpan/check_cve_2024_4577.shPOC详情
24This is a PoC for PHP CVE-2024-4577.https://github.com/bl4cksku11/CVE-2024-4577POC详情
25php-cgi RCE快速检测https://github.com/nemu1k5ma/CVE-2024-4577POC详情
26CVE-2024-4577https://github.com/aaddmin1122345/CVE-2024-4577-POCPOC详情
27POC for CVE-2024-4577 with Shodan integrationhttps://github.com/d3ck4/Shodan-CVE-2024-4577POC详情
28Nonehttps://github.com/Entropt/CVE-2024-4577_AnalysisPOC详情
29Nonehttps://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCEPOC详情
30Nonehttps://github.com/hexedbyte/cve-2024-4577POC详情
31Fixed and minimalist PoC of the CVE-2024-4577https://github.com/Sh0ckFR/CVE-2024-4577POC详情
32Argument injection vulnerability in PHPhttps://github.com/gotr00t0day/CVE-2024-4577POC详情
33PHP CGI Remote Code Execution (CVE-2024-4577) PoChttps://github.com/sug4r-wr41th/CVE-2024-4577POC详情
34Python script for get reverse shell with using CVE-2024-4577https://github.com/AlperenY-cs/CVE-2024-4577POC详情
35CVE-2024-4577 POChttps://github.com/VictorShem/CVE-2024-4577POC详情
36Nonehttps://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCEPOC详情
37Nonehttps://github.com/amandineVdw/CVE-2024-4577POC详情
38Nonehttps://github.com/PhinehasNarh/CVE-2024-4577-DefendPOC详情
39Nonehttps://github.com/ggfzx/CVE-2024-4577POC详情
40CVE-2024-4577https://github.com/olebris/CVE-2024-4577POC详情
41Nonehttps://github.com/BitMEXResearch/CVE-2024-4577POC详情
42CVE-2024-4577 EXPhttps://github.com/charis3306/CVE-2024-4577POC详情
43CVE-2024-4577 Exploitshttps://github.com/cybersagor/CVE-2024-4577POC详情
44PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploitation)https://github.com/l0n3m4n/CVE-2024-4577-RCEPOC详情
45ATTACK PoC - PHP CVE-2024-4577 https://github.com/bibo318/CVE-2024-4577-RCE-ATTACKPOC详情
46Automated PHP remote code execution scanner for CVE-2024-4577https://github.com/waived/CVE-2024-4577-PHP-RCEPOC详情
47PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/PizzaboiBestLegits/CVE-2024-4577POC详情
48CVEhttps://github.com/nNoSuger/CVE-2024-4577POC详情
49Nonehttps://github.com/a-roshbaik/CVE-2024-4577POC详情
50Nonehttps://github.com/a-roshbaik/CVE-2024-4577-PHP-RCEPOC详情
51批量验证POC和EXPhttps://github.com/Jcccccx/CVE-2024-4577POC详情
52Nonehttps://github.com/ManuelKy08/CVE-2024-4577---RRPOC详情
53CVE-2024-4577 Exploitshttps://github.com/bughuntar/CVE-2024-4577POC详情
54PHP CGI Argument Injection (CVE-2024-4577) RCEhttps://github.com/fa-rrel/CVE-2024-4577-RCEPOC详情
55CVE-2024-4577https://github.com/aaddmin1122345/cve-2024-4577POC详情
56Scanning CVE-2024-4577 vulnerability with a url list.https://github.com/ywChen-NTUST/PHP-CGI-RCE-ScannerPOC详情
57🚨 New Incident Report Completed! 🚨 Just wrapped up "Event ID 268: SOC292 - Possible PHP Injection Detected (CVE-2024-4577)" on LetsDefend.io. This analysis involved investigating an attempted Command Injection targeting our PHP server. Staying ahead of these threats with continuous monitoring and swift containment! 🛡️ https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-POC详情
58Nonehttps://github.com/phirojshah/CVE-2024-4577POC详情
59A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.https://github.com/JeninSutradhar/CVE-2024-4577-checkerPOC详情
60This is an Incident Response Walkthrough: Mitigating a Zero-Day Attack (CVE-2024-4577)https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthroughPOC详情
61Nonehttps://github.com/longhoangth18/CVE-2024-4577POC详情
62Nonehttps://github.com/0xbd2/CVE-2024-4577POC详情
63Nonehttps://github.com/ahmetramazank/CVE-2024-4577POC详情
64CVE-2024-4577 RCE PoChttps://github.com/BTtea/CVE-2024-4577-RCE-PoCPOC详情
65PHP CGI Argument Injection (CVE-2024-4577) RCEhttps://github.com/gh-ost00/CVE-2024-4577-RCEPOC详情
66CVE-2024-4577 POChttps://github.com/Dejavu666/CVE-2024-4577POC详情
67php-cgi-cve-2024-4577https://github.com/chihyeonwon/php-cgi-cve-2024-4577POC详情
68Nonehttps://github.com/Didarul342/CVE-2024-4577POC详情
69一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具https://github.com/Night-have-dreams/php-cgi-InjectorPOC详情
70php-cgi-cve-2024-4577https://github.com/mr-won/php-cgi-cve-2024-4577POC详情
71Nonehttps://github.com/mistakes1337/CVE-2024-4577POC详情
72PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/creamylegum/CVE-2024-4577-PHP-RCEPOC详情
73PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/fabulouscounc/CVE-2024-4577-PHP-RCEPOC详情
74PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/deadlybangle/CVE-2024-4577-PHP-RCEPOC详情
75PHP CGI - Argument Injection (CVE-2024-4577) is a critical argument injection flaw in PHP. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4577.yamlPOC详情
76Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E8%AF%AD%E8%A8%80%E6%BC%8F%E6%B4%9E/PHP%20CGI%20Windows%20%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-4577.mdPOC详情
77php-cgi-cve-2024-4577https://github.com/user20252228/php-cgi-cve-2024-4577POC详情
78Automated PHP remote code execution scanner for CVE-2024-4577https://github.com/gmh5225/CVE-2024-4577-PHP-RCEPOC详情
79php-cgi-cve-2024-4577https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577POC详情
80PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution)https://github.com/Gill-Singh-A/CVE-2024-4577-ExploitPOC详情
81使用PowsrShell掃描CVE-2024-4577https://github.com/tntrock/CVE-2024-4577_PowerShellPOC详情
82Nonehttps://github.com/KimJuhyeong95/cve-2024-4577POC详情
83CVE-2024-4577.pyhttps://github.com/ibrahmsql/CVE-2024-4577POC详情
84Exploit (C) CVE-2024-4577 on PHP CGI https://github.com/byteReaper77/CVE-2024-4577POC详情
85Nonehttps://github.com/r0otk3r/CVE-2024-4577POC详情
86Delivering PHP RCE (CVE-2024-4577) to the Local Network Servershttps://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCEPOC详情
87Exploit for php-cgihttps://github.com/Skycritch/CVE-2024-4577POC详情
88CVE-2024-4577 Mass Scanner & Exploit Toolhttps://github.com/CirqueiraDev/MassExploit-CVE-2024-4577POC详情
89CVE-2024-4577https://github.com/Ra1n-60W/CVE-2024-4577POC详情
90Nonehttps://github.com/xAL6/cve-2024-4577-scannerPOC详情
91Nonehttps://github.com/Ianthinus/CVE-2024-4577POC详情
92A PHP CGI Vulnerability Scanner for CVE-2024-4577https://github.com/InfoSec-DB/PHPCGIScannerPOC详情
93Nonehttps://github.com/a1ex-var1amov/ctf-cve-2024-4577POC详情
94Delivering PHP RCE (CVE-2024-4577) to the Local Network Servershttps://github.com/mananjain61/PHP-CGI-INTERNAL-RCEPOC详情
95Nonehttps://github.com/wilss0n/CVE-2024-4577POC详情
96Nonehttps://github.com/eagerapps/CVE-2024-4577POC详情
97Nonehttps://github.com/0XFFFF-XD/CVE-2024-4577-PHP-CGI-RCEPOC详情
98CVE-2024-4577https://github.com/aavamin/cve-2024-4577POC详情
99Nonehttps://github.com/pararam-org/CVE-2024-4577POC详情
100Nonehttps://github.com/graphite-org/CVE-2024-4577POC详情
101CVE-2024-4577 PHP CGI Argument Injection - Detection Lab with Vagrant VMs and Wazuh SIEM ruleshttps://github.com/rayngnpc/CVE-2024-4577-rayngPOC详情
三、漏洞 CVE-2024-4577 的情报信息
四、漏洞 CVE-2024-4577 的评论

暂无评论


发表评论