CVE-2024-4577 Mass Scanner & Exploit Tool
# CVE-2024-4577 Mass Scanner & Exploit Tool (PoC)
This Python script automates the detection of servers vulnerable to **CVE-2024-4577**, a critical vulnerability in PHP-CGI that allows **remote code execution (RCE)** through specially crafted query parameters.
The tool sends a PHP payload (`<?php phpinfo(); ?>`) using `auto_prepend_file=php://input` and detects vulnerability by analyzing the server's response for signs of successful code execution.
<br>
# Affected Versions
based on the original [https://devco.re/](https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/) This vulnerability affects all versions of PHP installed on the Windows operating system:
```
PHP 8.3 < 8.3.8
PHP 8.2 < 8.2.20
PHP 8.1 < 8.1.29
```
<br>
## Usage
```bash
pip install -r requirements.txt
```
```bash
python CVE-2024-4577.py list.txt 50
```
- `list.txt`: A file containing one domain per line
- `50`: Number of threads to use
<br>
## Output
- Vulnerable URLs are saved to `vulnerable.txt`
<br>
## Disclaimer
This tool is created **for educational purposes or authorized security assessments only**.
Unauthorized scanning or exploitation of third-party systems is **illegal** and may violate service terms or criminal laws.
Use responsibly.
<br>
**Coded by CirqueiraDev**
[4.0K] /data/pocs/7b91b62d66d48d7a8bff85b0d3d242f8305bfccd
├── [2.5K] CVE-2024-4577.py
├── [1.3K] README.md
└── [ 27] requirements.txt
0 directories, 3 files