Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3824 PoC — Buffer overflow and overread in phar_dir_read()

Source
Associated Vulnerability
Title:Buffer overflow and overread in phar_dir_read() (CVE-2023-3824)
Description:In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Description
CVE-2023-3824
Readme
# CVE-2023-3824

auto discover zif_system address and forgery closure_function.

## Reference
https://ctf-wiki.org/pwn/linux/user-mode/heap/ptmalloc2/off-by-one/#_7
https://mem2019.github.io/jekyll/update/2020/05/04/Easy-PHP-UAF.html
https://www.m4p1e.com/2024/03/01/CVE-2023-3824/
https://www.tarlogic.com/blog/disable_functions-bypasses-php-exploitation/
https://wiki.osdev.org/ELF_Tutorial
File Snapshot

[4.0K] /data/pocs/59d27d8e65c5d743089d15e8f9c01dd0a2bc748d ├── [532K] CVE-2023-3824.pdf ├── [6.9K] poc.php └── [ 392] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →