# SPIP porte_plume 插件任意 PHP 执行漏洞
## 概述
Porte_plume 插件在 SPIP 4.30-alpha2、4.2.13 和 4.1.16 版本之前存在任意代码执行漏洞。远程未认证攻击者可以通过发送恶意的 HTTP 请求,以 SPIP 用户的权限执行任意 PHP 代码。
## 影响版本
- SPIP 4.30-alpha2 之前版本
- SPIP 4.2.13 之前版本
- SPIP 4.1.16 之前版本
## 细节
攻击者可以通过发送精心构造的 HTTP 请求来利用此漏洞,使服务器执行任意 PHP 代码。
## 影响
该漏洞允许远程未认证的攻击者以 SPIP 用户的权限执行任意代码,可能导致完全控制受影响的系统。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | https://github.com/Chocapikk/CVE-2024-7954 | POC详情 |
2 | This exploit will attempt to execute system commands on SPIP targets. | https://github.com/bigb0x/CVE-2024-7954 | POC详情 |
3 | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | https://github.com/fa-rrel/CVE-2024-7954-RCE | POC详情 |
4 | None | https://github.com/TheCyberguy-17/RCE_CVE-2024-7954 | POC详情 |
5 | None | https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954 | POC详情 |
6 | The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. | https://github.com/issamiso/CVE-2024-7954 | POC详情 |
7 | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | https://github.com/gh-ost00/CVE-2024-7954-RCE | POC详情 |
8 | The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. | https://github.com/issamjr/CVE-2024-7954 | POC详情 |
9 | SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。 | https://github.com/zxj-hub/CVE-2024-7954POC | POC详情 |
10 | The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL) | https://github.com/0dayan0n/RCE_CVE-2024-7954- | POC详情 |
11 | None | https://github.com/Arthikw3b/RCE-CVE-2024-7954 | POC详情 |
12 | The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-7954.yaml | POC详情 |
标题: SPIP porte_plume plugin Arbitrary PHP Execution | Advisories | VulnCheck -- 🔗来源链接
标签: third-party-advisory