Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-4577 PoC β€” Argument Injection in PHP-CGI

Source
Associated Vulnerability
Title:Argument Injection in PHP-CGI (CVE-2024-4577)
Description:In PHP versionsΒ 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given toΒ Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Readme
# CVE-2024-4577: PHP CGI Argument Injection (XAMPP) πŸ’€

## Features ✨

- Multi-threaded scanning
- Single URL or bulk URL checks from a file
- Interactive exploitation shell

## Installation πŸ’»

Get started by cloning the repository and installing dependencies:

```bash
git clone https://github.com/Chocapikk/CVE-2024-4577.git
cd CVE-2024-4577
pip install -r requirements.txt
```

## Usage πŸ”‘

Run CVE-2024-4577 with these examples:

```bash
# Test a single URL
python exploit.py --url "http://example.com/"

# Test multiple URLs from a file
python exploit.py --file urls.txt

# Save vulnerable URLs
python exploit.py --file urls.txt --output vulnerable_urls.txt
```

## Ethical Disclaimer ⚠️

This tool is intended for ethical security testing only. Using it without authorization is illegal and unethical. Users are responsible for adhering to all relevant laws.

## Personal Note on Public Disclosure πŸ“˜

I released my code publicly to address the irresponsible ways critical vulnerabilities are often disclosed. People have already shared the correct method to exploit this vulnerability, but many are still publishing flawed or fabricated exploits for attention. Additionally, media outlets tend to create unnecessary fear by broadcasting incorrect or unverified claims. This misleads everyone from the people who need to patch systems to researchers, and it negatively impacts the defensive side of cybersecurity. The lack of accuracy and accountability in these practices is very troubling to me.
File Snapshot

[4.0K] /data/pocs/b4c8659b7be7d60f7d0996985b9229e3ce856567 β”œβ”€β”€ [6.2K] exploit.py β”œβ”€β”€ [1.5K] README.md └── [ 96] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’