Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9841 PoC — PHPUnit 安全漏洞

Source
Associated Vulnerability
Title:PHPUnit 安全漏洞 (CVE-2017-9841)
Description:TYPO3是瑞士TYPO3协会维护的一套免费开源的内容管理系统。PHPUnit是其中的一个基于PHP的测试框架。 PHPUnit 4.8.28之前的版本和5.6.3之前的5.x版本中的Util/PHP/eval-stdin.php文件存在安全漏洞。远程攻击者可通过发送以‘<?php’字符串开头的HTTP POST数据利用该漏洞执行任意PHP代码。
Description
(CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Execution
Readme
# PHPUnit_eval-stdin_RCE
(CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Execution

A code injection vulnerability in PHPUnit, a PHP unit testing framework which part of the Mailchimp , Mailchimp E-Commerce moduels in Drupal 
The vulnerability within the /phpunit/src/Util/PHP/eval-stdin.php file through its use of the php://input wrapper.

    Affected :  PHPUnit 4.8.19 - 4.8.27 , PHPUnit 5.0.10 - 5.6.2
    
    [Vuln path]
    /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
    /vendor/phpunit/phpunit/Util/PHP/eval-stdin.php
    /vendor/phpunit/src/Util/PHP/eval-stdin.php
    /vendor/phpunit/Util/PHP/eval-stdin.php
    /phpunit/phpunit/src/Util/PHP/eval-stdin.php
    /phpunit/phpunit/Util/PHP/eval-stdin.php
    /phpunit/src/Util/PHP/eval-stdin.php
    /phpunit/Util/PHP/eval-stdin.php
    /lib/phpunit/phpunit/src/Util/PHP/eval-stdin.php
    /lib/phpunit/phpunit/Util/PHP/eval-stdin.php
    /lib/phpunit/src/Util/PHP/eval-stdin.php
    /lib/phpunit/Util/PHP/eval-stdin.php
    
This script which check the presence or absence of CVE-2017-9841 Vulnerability is based on Python3.

    <Usage>
    
    python PHPUnit_eval-stdin_RCE.py <dst_ip> <dst_port> (user defined port)

    python PHPUnit_eval-stdin_RCE.py <dst_ip> (default : 80/tcp)
File Snapshot

[4.0K] /data/pocs/4f87c5234a482918256ec652804a2ccd7877e57b ├── [1.5K] PHPUnit_eval-stdin_RCE.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.