Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4577— Argument Injection in PHP-CGI

CVSS 9.8 · Critical KEV · Ransomware EPSS 94.37% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-4577

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Argument Injection in PHP-CGI
Source: NVD (National Vulnerability Database)
Vulnerability Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHP 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHP是一种在服务器端执行的脚本语言。 PHP存在操作系统命令注入漏洞,该漏洞源于在特定条件下,Windows系统使用“Best-Fit”行为替换命令行中的字符,这可能导致PHP CGI模块错误地将这些字符解释为PHP选项,从而泄露脚本的源代码,在服务器上运行任意PHP代码等。以下版本受到影响:8.1至8.1.29之前版本,8.3至8.3.8之前版本,8.2至8.2.20之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
PHP GroupPHP 8.1.* ~ 8.1.29 -

II. Public POCs for CVE-2024-4577

#POC DescriptionSource LinkShenlong Link
1CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.https://github.com/TAM-K592/CVE-2024-4577POC Details
2CVE-2024-4577https://github.com/ohhhh693/CVE-2024-4577POC Details
3PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/Junp0/CVE-2024-4577POC Details
4Nonehttps://github.com/princew88/CVE-2024-4577POC Details
5POC & $BASH script for CVE-2024-4577https://github.com/11whoami99/CVE-2024-4577POC Details
6PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/watchtowrlabs/CVE-2024-4577POC Details
7CVE-2024-4577https://github.com/zjhzjhhh/CVE-2024-4577POC Details
8Nonehttps://github.com/huseyinstif/CVE-2024-4577-Nuclei-TemplatePOC Details
9Nonehttps://github.com/taida957789/CVE-2024-4577POC Details
10Nonehttps://github.com/Wh02m1/CVE-2024-4577POC Details
11Nuclei Template for CVE-2024-4577https://github.com/Sysc4ll3r/CVE-2024-4577POC Details
12Nonehttps://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXPPOC Details
13Nonehttps://github.com/Yukiioz/CVE-2024-4577POC Details
14CVE-2024-4577 nuclei-templateshttps://github.com/0x20c/CVE-2024-4577-nucleiPOC Details
15Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.https://github.com/manuelinfosec/CVE-2024-4577POC Details
16CVE-2024-4577 Exploit POC https://github.com/zomasec/CVE-2024-4577POC Details
17PoC for CVE-2024-4577 written in bash, go, python and a nuclei templatehttps://github.com/ZephrFish/CVE-2024-4577-PoCPOC Details
18PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei templatehttps://github.com/ZephrFish/CVE-2024-4577-PHP-RCEPOC Details
19[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.https://github.com/xcanwin/CVE-2024-4577-PHP-RCEPOC Details
20python poc编写练手,可以对单个目标或批量检测https://github.com/dbyMelina/CVE-2024-4577POC Details
21PHP CGI Argument Injection vulnerabilityhttps://github.com/Chocapikk/CVE-2024-4577POC Details
22A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOITPOC Details
23Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerabilityhttps://github.com/it-t4mpan/check_cve_2024_4577.shPOC Details
24This is a PoC for PHP CVE-2024-4577.https://github.com/bl4cksku11/CVE-2024-4577POC Details
25php-cgi RCE快速检测https://github.com/nemu1k5ma/CVE-2024-4577POC Details
26CVE-2024-4577https://github.com/aaddmin1122345/CVE-2024-4577-POCPOC Details
27POC for CVE-2024-4577 with Shodan integrationhttps://github.com/d3ck4/Shodan-CVE-2024-4577POC Details
28Nonehttps://github.com/Entropt/CVE-2024-4577_AnalysisPOC Details
29Nonehttps://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCEPOC Details
30Nonehttps://github.com/hexedbyte/cve-2024-4577POC Details
31Fixed and minimalist PoC of the CVE-2024-4577https://github.com/Sh0ckFR/CVE-2024-4577POC Details
32Argument injection vulnerability in PHPhttps://github.com/gotr00t0day/CVE-2024-4577POC Details
33PHP CGI Remote Code Execution (CVE-2024-4577) PoChttps://github.com/sug4r-wr41th/CVE-2024-4577POC Details
34Python script for get reverse shell with using CVE-2024-4577https://github.com/AlperenY-cs/CVE-2024-4577POC Details
35CVE-2024-4577 POChttps://github.com/VictorShem/CVE-2024-4577POC Details
36Nonehttps://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCEPOC Details
37Nonehttps://github.com/amandineVdw/CVE-2024-4577POC Details
38Nonehttps://github.com/PhinehasNarh/CVE-2024-4577-DefendPOC Details
39Nonehttps://github.com/ggfzx/CVE-2024-4577POC Details
40CVE-2024-4577https://github.com/olebris/CVE-2024-4577POC Details
41Nonehttps://github.com/BitMEXResearch/CVE-2024-4577POC Details
42CVE-2024-4577 EXPhttps://github.com/charis3306/CVE-2024-4577POC Details
43CVE-2024-4577 Exploitshttps://github.com/cybersagor/CVE-2024-4577POC Details
44PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploitation)https://github.com/l0n3m4n/CVE-2024-4577-RCEPOC Details
45ATTACK PoC - PHP CVE-2024-4577 https://github.com/bibo318/CVE-2024-4577-RCE-ATTACKPOC Details
46Automated PHP remote code execution scanner for CVE-2024-4577https://github.com/waived/CVE-2024-4577-PHP-RCEPOC Details
47PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoChttps://github.com/PizzaboiBestLegits/CVE-2024-4577POC Details
48CVEhttps://github.com/nNoSuger/CVE-2024-4577POC Details
49Nonehttps://github.com/a-roshbaik/CVE-2024-4577POC Details
50Nonehttps://github.com/a-roshbaik/CVE-2024-4577-PHP-RCEPOC Details
51批量验证POC和EXPhttps://github.com/Jcccccx/CVE-2024-4577POC Details
52Nonehttps://github.com/ManuelKy08/CVE-2024-4577---RRPOC Details
53CVE-2024-4577 Exploitshttps://github.com/bughuntar/CVE-2024-4577POC Details
54PHP CGI Argument Injection (CVE-2024-4577) RCEhttps://github.com/fa-rrel/CVE-2024-4577-RCEPOC Details
55CVE-2024-4577https://github.com/aaddmin1122345/cve-2024-4577POC Details
56Scanning CVE-2024-4577 vulnerability with a url list.https://github.com/ywChen-NTUST/PHP-CGI-RCE-ScannerPOC Details
57🚨 New Incident Report Completed! 🚨 Just wrapped up "Event ID 268: SOC292 - Possible PHP Injection Detected (CVE-2024-4577)" on LetsDefend.io. This analysis involved investigating an attempted Command Injection targeting our PHP server. Staying ahead of these threats with continuous monitoring and swift containment! 🛡️ https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-POC Details
58Nonehttps://github.com/phirojshah/CVE-2024-4577POC Details
59A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.https://github.com/JeninSutradhar/CVE-2024-4577-checkerPOC Details
60This is an Incident Response Walkthrough: Mitigating a Zero-Day Attack (CVE-2024-4577)https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthroughPOC Details
61Nonehttps://github.com/longhoangth18/CVE-2024-4577POC Details
62Nonehttps://github.com/0xbd2/CVE-2024-4577POC Details
63Nonehttps://github.com/ahmetramazank/CVE-2024-4577POC Details
64CVE-2024-4577 RCE PoChttps://github.com/BTtea/CVE-2024-4577-RCE-PoCPOC Details
65PHP CGI Argument Injection (CVE-2024-4577) RCEhttps://github.com/gh-ost00/CVE-2024-4577-RCEPOC Details
66CVE-2024-4577 POChttps://github.com/Dejavu666/CVE-2024-4577POC Details
67php-cgi-cve-2024-4577https://github.com/chihyeonwon/php-cgi-cve-2024-4577POC Details
68Nonehttps://github.com/Didarul342/CVE-2024-4577POC Details
69一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具https://github.com/Night-have-dreams/php-cgi-InjectorPOC Details
70php-cgi-cve-2024-4577https://github.com/mr-won/php-cgi-cve-2024-4577POC Details
71Nonehttps://github.com/mistakes1337/CVE-2024-4577POC Details
72PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/creamylegum/CVE-2024-4577-PHP-RCEPOC Details
73PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/fabulouscounc/CVE-2024-4577-PHP-RCEPOC Details
74PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteamhttps://github.com/deadlybangle/CVE-2024-4577-PHP-RCEPOC Details
75PHP CGI - Argument Injection (CVE-2024-4577) is a critical argument injection flaw in PHP. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4577.yamlPOC Details
76Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E8%AF%AD%E8%A8%80%E6%BC%8F%E6%B4%9E/PHP%20CGI%20Windows%20%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-4577.mdPOC Details
77php-cgi-cve-2024-4577https://github.com/user20252228/php-cgi-cve-2024-4577POC Details
78Automated PHP remote code execution scanner for CVE-2024-4577https://github.com/gmh5225/CVE-2024-4577-PHP-RCEPOC Details
79php-cgi-cve-2024-4577https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577POC Details
80PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution)https://github.com/Gill-Singh-A/CVE-2024-4577-ExploitPOC Details
81使用PowsrShell掃描CVE-2024-4577https://github.com/tntrock/CVE-2024-4577_PowerShellPOC Details
82Nonehttps://github.com/KimJuhyeong95/cve-2024-4577POC Details
83CVE-2024-4577.pyhttps://github.com/ibrahmsql/CVE-2024-4577POC Details
84Exploit (C) CVE-2024-4577 on PHP CGI https://github.com/byteReaper77/CVE-2024-4577POC Details
85Nonehttps://github.com/r0otk3r/CVE-2024-4577POC Details
86Delivering PHP RCE (CVE-2024-4577) to the Local Network Servershttps://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCEPOC Details
87Exploit for php-cgihttps://github.com/Skycritch/CVE-2024-4577POC Details
88CVE-2024-4577 Mass Scanner & Exploit Toolhttps://github.com/CirqueiraDev/MassExploit-CVE-2024-4577POC Details
89CVE-2024-4577https://github.com/Ra1n-60W/CVE-2024-4577POC Details
90Nonehttps://github.com/xAL6/cve-2024-4577-scannerPOC Details
91Nonehttps://github.com/Ianthinus/CVE-2024-4577POC Details
92A PHP CGI Vulnerability Scanner for CVE-2024-4577https://github.com/InfoSec-DB/PHPCGIScannerPOC Details
93Nonehttps://github.com/a1ex-var1amov/ctf-cve-2024-4577POC Details
94Delivering PHP RCE (CVE-2024-4577) to the Local Network Servershttps://github.com/mananjain61/PHP-CGI-INTERNAL-RCEPOC Details
95Nonehttps://github.com/wilss0n/CVE-2024-4577POC Details
96Nonehttps://github.com/eagerapps/CVE-2024-4577POC Details
97Nonehttps://github.com/0XFFFF-XD/CVE-2024-4577-PHP-CGI-RCEPOC Details
98CVE-2024-4577https://github.com/aavamin/cve-2024-4577POC Details
99Nonehttps://github.com/pararam-org/CVE-2024-4577POC Details
100Nonehttps://github.com/graphite-org/CVE-2024-4577POC Details
101CVE-2024-4577 PHP CGI Argument Injection - Detection Lab with Vagrant VMs and Wazuh SIEM ruleshttps://github.com/rayngnpc/CVE-2024-4577-rayngPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-4577

登录查看更多情报信息。

Same Patch Batch · PHP Group · 2024-06-09 · 4 CVEs total

CVE-2024-55857.7 HIGHCommand injection via array-ish $command parameter of proc_open() (bypass CVE-2024-1874 fi
CVE-2024-54585.3 MEDIUMFilter bypass in filter_var (FILTER_VALIDATE_URL)
CVE-2024-2408PHP is vulnerable to the Marvin Attack

IV. Related Vulnerabilities

V. Comments for CVE-2024-4577

No comments yet


Leave a comment