Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3824 PoC — PHP 缓冲区错误漏洞

Source
Associated Vulnerability
Title:PHP 缓冲区错误漏洞 (CVE-2023-3824)
Description:PHP是一种在服务器端执行的脚本语言。 PHP存在安全漏洞,该漏洞源于函数phar_dir_read()存在缓冲区溢出漏洞,该漏洞会导致内存损坏或远程代码执行(RCE)。受影响的产品和版本:PHP 8.0.30之前的8.0版本,8.1.22之前的8.1版本,8.2.8之前的8.2版本。
Description
CVE-2023-3824
Readme
# CVE-2023-3824

auto discover zif_system address and forgery closure_function.

## Reference
https://ctf-wiki.org/pwn/linux/user-mode/heap/ptmalloc2/off-by-one/#_7
https://mem2019.github.io/jekyll/update/2020/05/04/Easy-PHP-UAF.html
https://www.m4p1e.com/2024/03/01/CVE-2023-3824/
https://www.tarlogic.com/blog/disable_functions-bypasses-php-exploitation/
https://wiki.osdev.org/ELF_Tutorial
File Snapshot

[4.0K] /data/pocs/59d27d8e65c5d743089d15e8f9c01dd0a2bc748d ├── [532K] CVE-2023-3824.pdf ├── [6.9K] poc.php └── [ 392] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.