Skip to content

CVE-2024-4577: PHP CGI Argument Injection Scanner and Exploit

GitHub: https://github.com/longhoangth18/CVE-2024-4577
Last Commit: October 14th, 2024


🚀 CVE-2024-4577: PHP CGI Argument Injection Scanner and Exploit

  

🛡️ Overview

CVE-2024-4577 is a critical vulnerability affecting PHP applications that utilize the Common Gateway Interface (CGI). This tool serves as both a scanner and an exploit, enabling cybersecurity professionals to:

  • Detect PHP CGI Argument Injection flaws
  • Exploit vulnerabilities leading to Remote Code Execution (RCE)
  • Execute arbitrary PHP code on vulnerable systems

🔑 Key Features

  • 🔍 Vulnerability Detection: Robust scanning process to identify susceptible PHP applications
  • 💥 Exploit Functionality: Customizable payloads for targeted vulnerability exploitation
  • 🔧 Flexible Payload Management: Specify PHP payload files for post-exploitation execution
  • 👥 User-Friendly Interface: Simple command-line options with clear, actionable output

📦 Installation

# Clone the repository
git clone https://github.com/your-username/CVE-2024-4577-scanner.git

# Navigate to the project directory
cd CVE-2024-4577-scanner

# Install required dependencies
pip install -r requirements.txt

📖 Usage

Ensure you have Python 3 installed on your system. Use the following command structure:

python3 CVE-2024-4577.py [-h] -t TARGET_FILE [-s] [-e] [-p PAYLOAD_FILE]

Arguments:

  • -h, --help: Show help message and exit
  • -t TARGET_FILE, --target-file TARGET_FILE: File containing target URLs (required)
  • -s, --scan: Perform vulnerability scan only
  • -e, --exploit: Attempt to exploit the vulnerability
  • -p PAYLOAD_FILE, --payload-file PAYLOAD_FILE: PHP payload file for exploitation

Example:

python3 CVE-2024-4577.py -t targetsite.txt -e -p rev_shell.php

🔍 Discovering Vulnerable Hosts

Utilize powerful search engines to identify potentially vulnerable hosts:

🌐 Shodan Query

Search for servers running PHP versions 8.1, 8.2, and 8.3:

server: PHP 8.1, server: PHP 8.2, server: PHP 8.3, html:"phpinfo"

🌐 FOFA Query

protocol="http" && (header="X-Powered-By: PHP/8.1" || header="X-Powered-By: PHP/8.2" || header="X-Powered-By: PHP/8.3")

⚠️ Disclaimer

This tool is intended for authorized security testing and research purposes only. Ensure you have explicit permission before scanning or attempting to exploit any systems you do not own or have the right to test.

📞 Support

If you encounter any issues or have questions, please file an issue on the GitHub issue tracker.

Comments

Latest