CVE-2017-9841
CRITICAL KEV NUCLEIPHPUnit <4.8.28, <5.6.3 - RCE
Title source: llmDescription
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Exploits (21)
nomisec
SCANNER
23 stars
by incogbyte · remote
https://github.com/incogbyte/laravel-phpunit-rce-masscaner
Nuclei Templates (1)
PHPUnit - Remote Code Execution
CRITICALby Random_Robbie,pikpikcu
References (8)
Scores
CVSS v3
9.8
EPSS
0.9421
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-02-15
VulnCheck KEV
2020-11-22
InTheWild.io
2021-04-08
ENISA EUVD
EUVD-2022-1528
Classification
CWE
CWE-94
Status
draft
Affected Products (3)
phpunit_project/phpunit
< 4.8.27
oracle/communications_diameter_signaling_router
< 8.5.0
phpunit/phpunit
< 4.8.28Packagist
Timeline
Published
Jun 27, 2017
KEV Added
Feb 15, 2022
Tracked Since
Feb 18, 2026