# PHP-CGI的参数注入漏洞
## 漏洞概述
在特定版本的PHP中,当使用Apache和PHP-CGI在Windows系统上运行时,如果系统设置使用某些代码页,Windows可能采用“Best-Fit”行为来替换命令行中传递给Win32 API函数的字符。这可能导致PHP CGI模块误将这些字符解释为PHP选项,从而使恶意用户能够向运行的PHP二进制文件传递选项,进而可能泄露脚本源代码或在服务器上执行任意PHP代码。
## 影响版本
- PHP 8.1.x 版本:8.1.0至8.1.28
- PHP 8.2.x 版本:8.2.0至8.2.19
- PHP 8.3.x 版本:8.3.0至8.3.7
## 细节
当系统配置使用某些代码页时,Windows会采用"Best-Fit"策略来替换传递给Win32 API函数中的字符。这可能导致PHP CGI模块将某些字符误判为PHP选项。恶意用户可通过这种方式向PHP二进制文件传递额外选项,从而对服务器进行进一步攻击。
## 影响
- 泄露脚本源代码
- 在服务器上执行任意PHP代码
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters. | https://github.com/TAM-K592/CVE-2024-4577 | POC详情 |
2 | CVE-2024-4577 | https://github.com/ohhhh693/CVE-2024-4577 | POC详情 |
3 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | https://github.com/Junp0/CVE-2024-4577 | POC详情 |
4 | None | https://github.com/princew88/CVE-2024-4577 | POC详情 |
5 | POC & $BASH script for CVE-2024-4577 | https://github.com/11whoami99/CVE-2024-4577 | POC详情 |
6 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | https://github.com/watchtowrlabs/CVE-2024-4577 | POC详情 |
7 | CVE-2024-4577 | https://github.com/zjhzjhhh/CVE-2024-4577 | POC详情 |
8 | None | https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template | POC详情 |
9 | None | https://github.com/taida957789/CVE-2024-4577 | POC详情 |
10 | None | https://github.com/Wh02m1/CVE-2024-4577 | POC详情 |
11 | Nuclei Template for CVE-2024-4577 | https://github.com/Sysc4ll3r/CVE-2024-4577 | POC详情 |
12 | None | https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP | POC详情 |
13 | None | https://github.com/Yukiioz/CVE-2024-4577 | POC详情 |
14 | CVE-2024-4577 nuclei-templates | https://github.com/0x20c/CVE-2024-4577-nuclei | POC详情 |
15 | Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands. | https://github.com/manuelinfosec/CVE-2024-4577 | POC详情 |
16 | CVE-2024-4577 Exploit POC | https://github.com/zomasec/CVE-2024-4577 | POC详情 |
17 | PoC for CVE-2024-4577 written in bash, go, python and a nuclei template | https://github.com/ZephrFish/CVE-2024-4577-PoC | POC详情 |
18 | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template | https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE | POC详情 |
19 | [漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass. | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE | POC详情 |
20 | python poc编写练手,可以对单个目标或批量检测 | https://github.com/dbyMelina/CVE-2024-4577 | POC详情 |
21 | PHP CGI Argument Injection vulnerability | https://github.com/Chocapikk/CVE-2024-4577 | POC详情 |
22 | A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE) | https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT | POC详情 |
23 | Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability | https://github.com/it-t4mpan/check_cve_2024_4577.sh | POC详情 |
24 | This is a PoC for PHP CVE-2024-4577. | https://github.com/bl4cksku11/CVE-2024-4577 | POC详情 |
25 | php-cgi RCE快速检测 | https://github.com/nemu1k5ma/CVE-2024-4577 | POC详情 |
26 | CVE-2024-4577 | https://github.com/aaddmin1122345/CVE-2024-4577-POC | POC详情 |
27 | POC for CVE-2024-4577 with Shodan integration | https://github.com/d3ck4/Shodan-CVE-2024-4577 | POC详情 |
28 | None | https://github.com/Entropt/CVE-2024-4577_Analysis | POC详情 |
29 | None | https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE | POC详情 |
30 | None | https://github.com/hexedbyte/cve-2024-4577 | POC详情 |
31 | Fixed and minimalist PoC of the CVE-2024-4577 | https://github.com/Sh0ckFR/CVE-2024-4577 | POC详情 |
32 | Argument injection vulnerability in PHP | https://github.com/gotr00t0day/CVE-2024-4577 | POC详情 |
33 | PHP CGI Remote Code Execution (CVE-2024-4577) PoC | https://github.com/sug4r-wr41th/CVE-2024-4577 | POC详情 |
34 | Python script for get reverse shell with using CVE-2024-4577 | https://github.com/AlperenY-cs/CVE-2024-4577 | POC详情 |
35 | CVE-2024-4577 POC | https://github.com/VictorShem/CVE-2024-4577 | POC详情 |
36 | None | https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE | POC详情 |
37 | None | https://github.com/amandineVdw/CVE-2024-4577 | POC详情 |
38 | None | https://github.com/PhinehasNarh/CVE-2024-4577-Defend | POC详情 |
39 | None | https://github.com/ggfzx/CVE-2024-4577 | POC详情 |
40 | CVE-2024-4577 | https://github.com/olebris/CVE-2024-4577 | POC详情 |
41 | None | https://github.com/BitMEXResearch/CVE-2024-4577 | POC详情 |
42 | CVE-2024-4577 EXP | https://github.com/charis3306/CVE-2024-4577 | POC详情 |
43 | CVE-2024-4577 Exploits | https://github.com/cybersagor/CVE-2024-4577 | POC详情 |
44 | PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploitation) | https://github.com/l0n3m4n/CVE-2024-4577-RCE | POC详情 |
45 | ATTACK PoC - PHP CVE-2024-4577 | https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK | POC详情 |
46 | Automated PHP remote code execution scanner for CVE-2024-4577 | https://github.com/waived/CVE-2024-4577-PHP-RCE | POC详情 |
47 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | https://github.com/PizzaboiBestLegits/CVE-2024-4577 | POC详情 |
48 | CVE | https://github.com/nNoSuger/CVE-2024-4577 | POC详情 |
49 | None | https://github.com/a-roshbaik/CVE-2024-4577 | POC详情 |
50 | None | https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE | POC详情 |
51 | 批量验证POC和EXP | https://github.com/Jcccccx/CVE-2024-4577 | POC详情 |
52 | None | https://github.com/ManuelKy08/CVE-2024-4577---RR | POC详情 |
53 | CVE-2024-4577 Exploits | https://github.com/bughuntar/CVE-2024-4577 | POC详情 |
54 | PHP CGI Argument Injection (CVE-2024-4577) RCE | https://github.com/fa-rrel/CVE-2024-4577-RCE | POC详情 |
55 | CVE-2024-4577 | https://github.com/aaddmin1122345/cve-2024-4577 | POC详情 |
56 | Scanning CVE-2024-4577 vulnerability with a url list. | https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner | POC详情 |
57 | 🚨 New Incident Report Completed! 🚨 Just wrapped up "Event ID 268: SOC292 - Possible PHP Injection Detected (CVE-2024-4577)" on LetsDefend.io. This analysis involved investigating an attempted Command Injection targeting our PHP server. Staying ahead of these threats with continuous monitoring and swift containment! 🛡️ | https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577- | POC详情 |
58 | None | https://github.com/phirojshah/CVE-2024-4577 | POC详情 |
59 | A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI. | https://github.com/JeninSutradhar/CVE-2024-4577-checker | POC详情 |
60 | This is an Incident Response Walkthrough: Mitigating a Zero-Day Attack (CVE-2024-4577) | https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthrough | POC详情 |
61 | None | https://github.com/longhoangth18/CVE-2024-4577 | POC详情 |
62 | None | https://github.com/0xbd2/CVE-2024-4577 | POC详情 |
63 | None | https://github.com/ahmetramazank/CVE-2024-4577 | POC详情 |
64 | CVE-2024-4577 RCE PoC | https://github.com/BTtea/CVE-2024-4577-RCE-PoC | POC详情 |
65 | PHP CGI Argument Injection (CVE-2024-4577) RCE | https://github.com/gh-ost00/CVE-2024-4577-RCE | POC详情 |
66 | CVE-2024-4577 POC | https://github.com/Dejavu666/CVE-2024-4577 | POC详情 |
67 | php-cgi-cve-2024-4577 | https://github.com/chihyeonwon/php-cgi-cve-2024-4577 | POC详情 |
68 | None | https://github.com/Didarul342/CVE-2024-4577 | POC详情 |
69 | 一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具 | https://github.com/Night-have-dreams/php-cgi-Injector | POC详情 |
70 | php-cgi-cve-2024-4577 | https://github.com/mr-won/php-cgi-cve-2024-4577 | POC详情 |
71 | None | https://github.com/mistakes1337/CVE-2024-4577 | POC详情 |
72 | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam | https://github.com/creamylegum/CVE-2024-4577-PHP-RCE | POC详情 |
73 | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam | https://github.com/fabulouscounc/CVE-2024-4577-PHP-RCE | POC详情 |
74 | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam | https://github.com/deadlybangle/CVE-2024-4577-PHP-RCE | POC详情 |
75 | PHP CGI - Argument Injection (CVE-2024-4577) is a critical argument injection flaw in PHP. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4577.yaml | POC详情 |
76 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E8%AF%AD%E8%A8%80%E6%BC%8F%E6%B4%9E/PHP%20CGI%20Windows%20%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-4577.md | POC详情 |
77 | php-cgi-cve-2024-4577 | https://github.com/user20252228/php-cgi-cve-2024-4577 | POC详情 |
78 | Automated PHP remote code execution scanner for CVE-2024-4577 | https://github.com/gmh5225/CVE-2024-4577-PHP-RCE | POC详情 |
79 | php-cgi-cve-2024-4577 | https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577 | POC详情 |
80 | PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution) | https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit | POC详情 |
81 | 使用PowsrShell掃描CVE-2024-4577 | https://github.com/tntrock/CVE-2024-4577_PowerShell | POC详情 |
82 | None | https://github.com/KimJuhyeong95/cve-2024-4577 | POC详情 |
83 | CVE-2024-4577.py | https://github.com/ibrahmsql/CVE-2024-4577 | POC详情 |
84 | Exploit (C) CVE-2024-4577 on PHP CGI | https://github.com/byteReaper77/CVE-2024-4577 | POC详情 |
85 | None | https://github.com/r0otk3r/CVE-2024-4577 | POC详情 |
86 | Delivering PHP RCE (CVE-2024-4577) to the Local Network Servers | https://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCE | POC详情 |
87 | Exploit for php-cgi | https://github.com/Skycritch/CVE-2024-4577 | POC详情 |
88 | CVE-2024-4577 Mass Scanner & Exploit Tool | https://github.com/CirqueiraDev/MassExploit-CVE-2024-4577 | POC详情 |
89 | CVE-2024-4577 | https://github.com/Ra1n-60W/CVE-2024-4577 | POC详情 |
暂无评论