Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9841 PoC — PHPUnit 安全漏洞

Source
Associated Vulnerability
Title:PHPUnit 安全漏洞 (CVE-2017-9841)
Description:Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Description
PHPunit Checker CVE-2017-9841 By MrMad
Readme
<div align="center"><samp><h1>PHPunit Exploiter + Checker > CVE-2017-9841</h1></samp></div>

<b> Overview : </b>
<samp>PHPUnit is a unit test framework for the PHP programming language. This is a sample xUnit architecture for a unit testing framework that originated with SUnit and became popular with JUnit. PHPUnit was created by Sebastian Bergmann
</samp>


# Installation
```
python3 -m pip install -r requirements.txt
```

# Image
<img src="https://raw.githubusercontent.com/MadExploits/PHPunit-Exploit/main/Screenshot%20from%202023-01-23%2022-04-16.png" style="widht:100%;">
File Snapshot

[4.0K] /data/pocs/cf7dfedcc005924be7e860c635fa58ed9ea381ac ├── [ 11K] phpunit.py ├── [ 581] README.md ├── [ 52] requirements.txt └── [1.2M] Screenshot from 2023-01-23 22-04-16.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →