POC详情: 7b91b62d66d48d7a8bff85b0d3d242f8305bfccd

来源
关联漏洞
标题: PHP 操作系统命令注入漏洞 (CVE-2024-4577)
描述:PHP是一种在服务器端执行的脚本语言。 PHP存在操作系统命令注入漏洞,该漏洞源于在特定条件下,Windows系统使用“Best-Fit”行为替换命令行中的字符,这可能导致PHP CGI模块错误地将这些字符解释为PHP选项,从而泄露脚本的源代码,在服务器上运行任意PHP代码等。以下版本受到影响:8.1至8.1.29之前版本,8.3至8.3.8之前版本,8.2至8.2.20之前版本。
描述
CVE-2024-4577 Mass Scanner & Exploit Tool
介绍


# CVE-2024-4577 Mass Scanner & Exploit Tool (PoC)

This Python script automates the detection of servers vulnerable to **CVE-2024-4577**, a critical vulnerability in PHP-CGI that allows **remote code execution (RCE)** through specially crafted query parameters.

The tool sends a PHP payload (`<?php phpinfo(); ?>`) using `auto_prepend_file=php://input` and detects vulnerability by analyzing the server's response for signs of successful code execution.

<br>

# Affected Versions

based on the original [https://devco.re/](https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/) This vulnerability affects all versions of PHP installed on the Windows operating system:
```
PHP 8.3 < 8.3.8
PHP 8.2 < 8.2.20
PHP 8.1 < 8.1.29
```

<br>

## Usage

```bash
pip install -r requirements.txt
```

```bash
python CVE-2024-4577.py list.txt 50
```

- `list.txt`: A file containing one domain per line
- `50`: Number of threads to use

<br>

## Output

- Vulnerable URLs are saved to `vulnerable.txt`

<br>

## Disclaimer

This tool is created **for educational purposes or authorized security assessments only**.  
Unauthorized scanning or exploitation of third-party systems is **illegal** and may violate service terms or criminal laws.  
Use responsibly.

<br>

**Coded by CirqueiraDev**
文件快照

[4.0K] /data/pocs/7b91b62d66d48d7a8bff85b0d3d242f8305bfccd ├── [2.5K] CVE-2024-4577.py ├── [1.3K] README.md └── [ 27] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。