目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2024-4577 PoC — PHP 操作系统命令注入漏洞

来源
关联漏洞
标题:PHP 操作系统命令注入漏洞 (CVE-2024-4577)
Description:PHP是一种在服务器端执行的脚本语言。 PHP存在操作系统命令注入漏洞,该漏洞源于在特定条件下,Windows系统使用“Best-Fit”行为替换命令行中的字符,这可能导致PHP CGI模块错误地将这些字符解释为PHP选项,从而泄露脚本的源代码,在服务器上运行任意PHP代码等。以下版本受到影响:8.1至8.1.29之前版本,8.3至8.3.8之前版本,8.2至8.2.20之前版本。
Description
This is a PoC for PHP CVE-2024-4577.
介绍
# CVE-2024-4577
This is a PoC for PHP CVE-2024-4577.

## Introduction

Security in the digital environment is more important than ever. That said, imagine an invisible door opens on millions of websites due to a new vulnerability in PHP, one of the most used programming languages ​​on the web. This vulnerability, known as **CVE-2024-4577**, allows remote attackers to execute arbitrary commands on affected servers by injecting arguments into 1CGI. Discovered by security researcher **Orange Tsai** ([@orange_8361](https://x.com/orange_8361)) of **DEVCORE** ([@d3vc0r3](https://x.com/d3vc0r3)), this flaw has captured the attention of the global security community. The information we present here comes from external research sources.

## Vulnerability Description

**CVE-2024-4577** is a remote code execution (**RCE**) vulnerability that affects the implementation of encoding conversion on Windows systems. This flaw is due to the way PHP handles certain arguments during encoding conversion, which can be exploited by attackers to inject and execute malicious code on the server. The vulnerability arises due to an oversight in the [**Best-Fit**](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ucoderef/d1980631-6401-428e-a49d-d71394be7da8) feature of encoding conversion within the Windows operating system, allowing attackers to bypass the protection implemented for [**CVE-2012-1823**](https://www.kb.cert.org/vuls/id/520827) via specific character sequences.

## Usage

```PHP
./CVE-2024-4577.sh <TARGET_URL>
```

Happy hacking!
文件快照

[4.0K] /data/pocs/a9210809945c8c83ba6ff3a1f8219a0ed9abb92a ├── [1.4K] CVE-2024-4577.sh └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。