nomisec
WORKING POC
1,835 stars
by neex · remote
https://github.com/neex/phuip-fpizdam
This repository contains a functional exploit for CVE-2019-11043, a vulnerability in php-fpm that allows remote code execution under specific nginx configurations. The exploit leverages a buffer underflow in php-fpm to manipulate environment variables and execute arbitrary commands.
Classification
Working Poc 100%
Target:
php-fpm (PHP 7+)
No auth needed
Prerequisites:
Nginx + php-fpm with specific configuration (e.g., fastcgi_split_path_info and PATH_INFO manipulation) · No file existence checks in nginx configuration
nomisec
WORKING POC
146 stars
by theMiddleBlue · remote
https://github.com/theMiddleBlue/CVE-2019-11043
This repository contains a functional Python exploit for CVE-2019-11043, a vulnerability in PHP-FPM that allows remote code execution (RCE) via crafted HTTP headers. The exploit leverages a buffer overflow in the PHP-FPM process to inject malicious PHP settings and achieve command execution.
Classification
Working Poc 95%
Target:
PHP-FPM (versions affected by CVE-2019-11043)
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHP-FPM · Network access to the target's PHP-FPM service
nomisec
WORKING POC
105 stars
by jas502n · infoleak
https://github.com/jas502n/CVE-2019-11043
This repository contains a functional exploit for CVE-2019-11043, a remote code execution vulnerability in php-fpm when used with Nginx. The exploit leverages the phuip-fpizdam tool to trigger the vulnerability by manipulating environment variables and path info in PHP-FPM configurations.
Classification
Working Poc 95%
Target:
php-fpm (PHP 7.2.10) with Nginx (1.19.2)
No auth needed
Prerequisites:
Vulnerable php-fpm and Nginx configuration · Access to the target URL
nomisec
WORKING POC
27 stars
by akamajoris · remote
https://github.com/akamajoris/CVE-2019-11043-Docker
This repository provides a Dockerized environment with a vulnerable PHP-FPM (7.3.9) and nginx setup to demonstrate CVE-2019-11043, a remote code execution vulnerability. It includes a minimal PHP script and references an external exploit tool (`phuip-fpizdam`) to trigger the vulnerability.
Classification
Working Poc 95%
Target:
PHP-FPM 7.3.9 with nginx
No auth needed
Prerequisites:
Docker environment · External exploit tool (`phuip-fpizdam`)
nomisec
SCANNER
16 stars
by k8gege · infoleak
https://github.com/k8gege/CVE-2019-11043
The repository contains a Python script that scans for CVE-2019-11043, a PHP-FPM remote code execution vulnerability, by sending crafted requests to detect the presence of the vulnerability. It does not include exploit code for achieving RCE but confirms vulnerability by checking for a 502 status code response.
Classification
Scanner 90%
Target:
PHP-FPM with misconfigured Nginx
No auth needed
Prerequisites:
Target URL with PHP-FPM and Nginx misconfiguration
nomisec
WORKING POC
14 stars
by kriskhub · remote
https://github.com/kriskhub/CVE-2019-11043
This repository contains a functional Python exploit for CVE-2019-11043, which leverages a buffer overflow in PHP-FPM when combined with NGINX due to improper handling of newline characters in the `fastcgi_split_path_info` directive. The exploit achieves remote code execution by manipulating the `PATH_INFO` variable to overwrite FastCGI protocol data and inject malicious PHP configurations.
Classification
Working Poc 95%
Target:
PHP-FPM (7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11) with NGINX
No auth needed
Prerequisites:
NGINX configured to forward requests to PHP-FPM · Use of `fastcgi_split_path_info` with a regex starting with `^` and ending with `$` · No file existence checks (e.g., `try_files`) in NGINX configuration · PHP-FPM version vulnerable to CVE-2019-11043
nomisec
WORKING POC
14 stars
by 0th3rs-Security-Team · remote
https://github.com/0th3rs-Security-Team/CVE-2019-11043
This repository contains a functional exploit for CVE-2019-11043, a PHP-FPM remote code execution vulnerability. The exploit leverages environment variable injection via malformed HTTP headers to achieve RCE on vulnerable PHP versions.
Classification
Working Poc 95%
Target:
PHP (7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11)
No auth needed
Prerequisites:
PHP-FPM with Nginx configuration exposing the vulnerability · Ability to send crafted HTTP requests to the target
nomisec
SCANNER
8 stars
by ypereirareis · remote
https://github.com/ypereirareis/docker-CVE-2019-11043
This repository provides a Dockerized scanner for CVE-2019-11043, a PHP-FPM buffer overflow vulnerability. It uses the 'phuip-fpizdam' tool to detect and exploit the vulnerability by sending crafted requests to determine if a target is vulnerable.
Classification
Scanner 90%
Target:
PHP-FPM (PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, 7.3.x below 7.3.11)
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHP-FPM · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
5 stars
by huowen · remote
https://github.com/huowen/CVE-2019-11043
This repository contains a functional Python exploit for CVE-2019-11043, a remote code execution vulnerability in PHP-FPM. The exploit leverages a buffer overflow in the PHP-FPM environment variable handling to achieve RCE by manipulating query string lengths and headers.
Classification
Working Poc 95%
Target:
PHP-FPM (versions affected by CVE-2019-11043)
No auth needed
Prerequisites:
PHP-FPM with vulnerable configuration · Access to the target URL
nomisec
SCANNER
4 stars
by AleWong · remote
https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-
The repository contains a Python script that scans for CVE-2019-11043 by detecting vulnerable QSL (Query String Length) values in Nginx + PHP-FPM configurations. It does not include exploit code for remote code execution but identifies potential vulnerabilities by triggering a 502 status code.
Classification
Scanner 90%
Target:
Nginx with PHP-FPM (specific versions not explicitly listed)
No auth needed
Prerequisites:
Nginx with PHP-FPM configured to use fastcgi_split_path_info
nomisec
WORKING POC
4 stars
by lindemer · remote
https://github.com/lindemer/CVE-2019-11043
This repository contains a functional Python exploit for CVE-2019-11043, a PHP-FPM remote code execution vulnerability. The exploit leverages a buffer underflow caused by incorrect parsing of newline characters in URIs to overwrite internal PHP variables and execute arbitrary shell code.
Classification
Working Poc 95%
Target:
PHP-FPM (PHP versions 7.x before 7.3.11, 7.2.x before 7.2.24, 7.1.x before 7.1.33)
No auth needed
Prerequisites:
PHP-FPM with a vulnerable configuration (e.g., NGINX with fastcgi_split_path_info) · Ability to send crafted HTTP requests to the target server
github
WRITEUP
3 stars
by HxDDD · poc
https://github.com/HxDDD/CVE-PoC/tree/main/Nginx/(RCE) CVE-2019-11043.md
This repository provides a detailed technical analysis of CVE-2019-11043, a vulnerability in PHP-FPM that allows remote code execution due to improper validation of path_info. It includes environment setup instructions, exploitation steps using the 'phuip-fpizdam' tool, and a root cause analysis involving arithmetic underflow in the _fcgi_data_seg structure.
Classification
Writeup 95%
Target:
PHP-FPM (7.1.x to 7.1.33, 7.2.x to 7.2.24, 7.3.x to 7.3.11)
No auth needed
Prerequisites:
Docker · Golang · Vulnerable PHP-FPM version
nomisec
WORKING POC
3 stars
by MRdoulestar · remote
https://github.com/MRdoulestar/CVE-2019-11043
This repository contains a functional exploit for CVE-2019-11043, a PHP-FPM remote code execution vulnerability. The exploit leverages environment variable injection via malformed HTTP headers to manipulate PHP configurations and achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
PHP-FPM (PHP 7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11)
No auth needed
Prerequisites:
PHP-FPM with Nginx or similar web server · Exposed PHP-FPM service · Specific PHP configuration (e.g., session.auto_start)
nomisec
WORKING POC
3 stars
by CodeHex083 · remote
https://github.com/CodeHex083/phuip-fpizdam
This repository contains a functional exploit for CVE-2019-11043, a vulnerability in php-fpm that allows remote code execution under specific nginx configurations. The exploit manipulates PATH_INFO and php.ini settings to achieve command execution.
Classification
Working Poc 100%
Target:
php-fpm (PHP 7+) with vulnerable nginx configurations
No auth needed
Prerequisites:
Nginx + php-fpm with specific configuration (e.g., fastcgi_split_path_info without file existence checks) · PHP 7+
nomisec
WORKING POC
2 stars
by jptr218 · remote
https://github.com/jptr218/php_hack
This repository contains a functional exploit for CVE-2019-11043, which targets a PHP-FPM vulnerability involving insecure pointer arithmetic. The exploit automates the process of finding the Query String Length (QSL) and header length, then sends a crafted payload to achieve remote code execution (RCE) on vulnerable PHP servers.
Classification
Working Poc 95%
Target:
PHP-FPM (versions affected by CVE-2019-11043)
No auth needed
Prerequisites:
Vulnerable PHP-FPM server · Network access to the target
nomisec
WORKING POC
1 stars
by fairyming · poc
https://github.com/fairyming/CVE-2019-11043
This repository contains a functional PoC for CVE-2019-11043, a PHP-FPM remote code execution vulnerability. The exploit leverages malformed HTTP headers and query strings to trigger arbitrary command execution in vulnerable PHP-FPM configurations.
Classification
Working Poc 95%
Target:
PHP-FPM (versions affected by CVE-2019-11043)
No auth needed
Prerequisites:
Vulnerable PHP-FPM configuration with specific Nginx misconfigurations
nomisec
WORKING POC
1 stars
by moniik · poc
https://github.com/moniik/CVE-2019-11043_env
This repository provides a Dockerized environment for exploiting CVE-2019-11043, a PHP-FPM remote code execution vulnerability. It includes a preconfigured PHP-FPM and Nginx setup with debugging capabilities via gdbserver.
Classification
Working Poc 90%
Target:
PHP-FPM (PHP FastCGI Process Manager) versions affected by CVE-2019-11043
No auth needed
Prerequisites:
Docker environment · Network access to target PHP-FPM service
nomisec
WORKING POC
1 stars
by shadow-horse · remote
https://github.com/shadow-horse/cve-2019-11043
This repository contains a functional exploit for CVE-2019-11043, a remote code execution vulnerability in PHP-FPM when used with specific Nginx configurations. The exploit leverages a buffer underflow in PHP-FPM's handling of PATH_INFO when manipulated via crafted HTTP requests.
Classification
Working Poc 95%
Target:
PHP-FPM (PHP 7+) with Nginx
No auth needed
Prerequisites:
Nginx with vulnerable fastcgi_split_path_info configuration · PHP-FPM (PHP 7+) without file existence checks
nomisec
WRITEUP
by AndrewMas99 · poc
https://github.com/AndrewMas99/CVE-2019-11043-Vulnerability
This repository provides a detailed technical analysis and demonstration of CVE-2019-11043, a PHP-FPM path handling vulnerability leading to remote code execution. It includes logs, disk images, and configuration files but lacks functional exploit code.
Classification
Writeup 90%
Target:
PHP-FPM with NGINX
No auth needed
Prerequisites:
Vulnerable PHP-FPM configuration · NGINX misconfiguration
nomisec
WORKING POC
by a1ex-var1amov · poc
https://github.com/a1ex-var1amov/ctf-cve-2019-11043
This repository provides a Dockerized lab environment for CVE-2019-11043, an Nginx/PHP-FPM RCE vulnerability. It includes a vulnerable Nginx configuration, PHP-FPM setup, and a minimal PHP application to demonstrate the exploit. The README provides detailed instructions for building, running, and exploiting the vulnerability using the `phuip-fpizdam` tool.
Classification
Working Poc 95%
Target:
Nginx with PHP-FPM (PHP 7.3.8-1)
No auth needed
Prerequisites:
Docker environment · phuip-fpizdam tool for exploitation
nomisec
WORKING POC
by bayazid-bit · poc
https://github.com/bayazid-bit/CVE-2019-11043-
This Python script exploits CVE-2019-11043 by injecting commands into the User-Agentt header, leveraging a command injection vulnerability in PHP's nginx configuration. It provides an interactive shell for executing arbitrary commands on the target system.
Classification
Working Poc 90%
Target:
PHP-FPM with nginx (CVE-2019-11043)
No auth needed
Prerequisites:
Target must be running vulnerable PHP-FPM with nginx · Network access to the target
nomisec
WRITEUP
by ianxtianxt · poc
https://github.com/ianxtianxt/CVE-2019-11043
The repository describes CVE-2019-11043, a vulnerability in Nginx with php-fpm where a crafted request with %0a can lead to remote code execution due to improper handling of PATH_INFO. It includes mitigation steps and mentions the existence of exploit code but does not provide it directly.
Classification
Writeup 90%
Target:
Nginx with php-fpm
No auth needed
Prerequisites:
Nginx with specific fastcgi_split_path_info configuration · php-fpm backend
nomisec
WORKING POC
by corifeo · remote
https://github.com/corifeo/CVE-2019-11043
This repository contains a functional Python script that exploits CVE-2019-11043, a buffer overflow vulnerability in PHP-FPM. The exploit manipulates HTTP headers and URL lengths to trigger remote code execution by poisoning environment variables.
Classification
Working Poc 95%
Target:
PHP-FPM (PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, 7.3.x below 7.3.11)
No auth needed
Prerequisites:
PHP-FPM configured with specific environment variable handling · Network access to the target server
nomisec
SUSPICIOUS
by tinker-li · poc
https://github.com/tinker-li/CVE-2019-11043
The repository contains only a README with links to external resources (PHP bug tracker and GitHub repo) but no actual exploit code or technical details. This is characteristic of a social engineering lure.
Classification
Suspicious 90%
Target:
PHP (version not specified)
No auth needed
gitlab
WORKING POC
by yangsec888 · poc
https://gitlab.com/yangsec888/phuip-fpizdam
This repository contains a functional exploit for CVE-2019-11043, targeting a vulnerability in php-fpm when used with specific nginx configurations. The exploit achieves remote code execution by manipulating PATH_INFO and FastCGI parameters.
Classification
Working Poc 100%
Target:
php-fpm (PHP 7+) with vulnerable nginx configurations
No auth needed
Prerequisites:
nginx with specific fastcgi_split_path_info configuration · PHP 7+ · no file existence checks in nginx config
nomisec
SCANNER
by jas9reet · infoleak
https://github.com/jas9reet/CVE-2019-11043
The repository contains a Python script that checks for the presence of CVE-2019-11043 by sending crafted HTTP requests to detect vulnerable PHP-FPM configurations. It does not include a full exploit but scans for potential vulnerabilities.
Classification
Scanner 90%
Target:
PHP-FPM with Nginx
No auth needed
Prerequisites:
Target running PHP-FPM with Nginx · Network access to the target
nomisec
WORKING POC
by gon905332-jpg · remote
https://github.com/gon905332-jpg/cve-2019-11043.py
This repository contains a Python port of the ExploitDB PoC for CVE-2019-11043, targeting PHP-FPM with a crafted request to achieve remote code execution (RCE). The script includes detection methods and parameter brute-forcing to exploit the vulnerability.
Classification
Working Poc 90%
Target:
PHP-FPM (versions affected by CVE-2019-11043)
No auth needed
Prerequisites:
Access to a vulnerable PHP-FPM instance · Network connectivity to the target
metasploit
WORKING POC
NORMAL
by neex, cdelafuente-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/php_fpm_rce.rb
This Metasploit module exploits CVE-2019-11043, an underflow vulnerability in PHP-FPM (versions 7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11) when used with Nginx. It detects vulnerable configurations, executes arbitrary commands via crafted HTTP requests, and cleans up artifacts.
Classification
Working Poc 95%
Target:
PHP-FPM (7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11) with Nginx
No auth needed
Prerequisites:
Vulnerable PHP-FPM version · Specific Nginx + PHP-FPM configuration · Access to a PHP page
exploitdb
WORKING POC
by Emil Lerner · webappsphp
https://www.exploit-db.com/exploits/47553
This is a Go-based exploit for CVE-2019-11043, targeting a buffer underflow in php-fpm when combined with specific nginx configurations. It allows remote code execution by manipulating PATH_INFO and FastCGI parameters.
Classification
Working Poc 100%
Target:
php-fpm (PHP 7+) with vulnerable nginx configurations
No auth needed
Prerequisites:
Nginx with specific FastCGI configuration · PHP 7+ with php-fpm · No file existence checks in nginx config
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/48182
This Metasploit module exploits CVE-2019-11043, an underflow vulnerability in PHP-FPM (versions 7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11) when used with Nginx. It detects vulnerable configurations by manipulating query string and header lengths, then executes arbitrary commands via PHP INI directives.
Classification
Working Poc 95%
Target:
PHP-FPM (7.1.x < 7.1.33, 7.2.x < 7.2.24, 7.3.x < 7.3.11) with Nginx
No auth needed
Prerequisites:
Target must have a specific Nginx + PHP-FPM configuration · PHP-FPM must be accessible via HTTP