exploitdb
WORKING POC
by İbrahimsql · pythonwebappsphp
https://www.exploit-db.com/exploits/52331
This exploit leverages CVE-2024-4577, a PHP CGI argument injection vulnerability, to achieve remote code execution by manipulating command-line arguments and bypassing security restrictions. It includes functionality for vulnerability checking, command execution, and an interactive shell.
Classification
Working Poc 95%
Target:
PHP < 8.3.4, PHP < 8.2.17, PHP < 8.1.27
No auth needed
Prerequisites:
PHP CGI module exposed · Network access to the target
nomisec
WORKING POC
306 stars
by watchtowrlabs · remote
https://github.com/watchtowrlabs/CVE-2024-4577
This repository contains a functional Python exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting Windows systems. The exploit sends a crafted HTTP POST request to execute arbitrary PHP code, demonstrated by launching 'calc.exe' via system command injection.
Classification
Working Poc 100%
Target:
PHP (Windows) versions 8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29
No auth needed
Prerequisites:
PHP CGI mode enabled on Windows · Network access to vulnerable PHP endpoint
nomisec
WORKING POC
160 stars
by xcanwin · remote
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
The repository contains a functional exploit for CVE-2024-4577, leveraging PHP-CGI misconfiguration (cgi.force_redirect + REDIRECT-STATUS) to achieve RCE. It includes two exploitation methods: one using FastCGI protocol communication and another via SSRF with data:// protocol.
Classification
Working Poc 95%
Target:
PHP Windows versions (5.x-8.3.x) and XAMPP Windows versions (5.x-8.2.x)
No auth needed
Prerequisites:
PHP-CGI enabled on Windows · Network access to target PHP server
nomisec
SCANNER
79 stars
by TAM-K592 · remote
https://github.com/TAM-K592/CVE-2024-4577
The repository contains Go and Python scripts that test for CVE-2024-4577 by sending crafted HTTP requests to PHP CGI endpoints and checking responses for indicators of vulnerability. The scripts do not execute arbitrary commands but detect potential exposure to the argument injection flaw.
Classification
Scanner 95%
Target:
PHP CGI (8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
PHP CGI exposed on the target server · Network access to the target
nomisec
WORKING POC
44 stars
by 11whoami99 · remote
https://github.com/11whoami99/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, a PHP-CGI argument injection vulnerability. The exploit manipulates PHP INI settings via query parameters to achieve remote code execution by setting `allow_url_include` and `auto_prepend_file` to execute arbitrary PHP code from input.
Classification
Working Poc 95%
Target:
PHP-CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
PHP-CGI exposed with vulnerable configuration · Ability to send crafted HTTP requests to the target
nomisec
WORKING POC
40 stars
by Night-have-dreams · remote
https://github.com/Night-have-dreams/php-cgi-Injector
This repository contains a functional exploit tool for CVE-2024-4577 and CVE-2024-8926, targeting PHP-CGI parameter injection vulnerabilities. It includes multiple bypass modules for WAF evasion, Tor support, and various exploitation modes such as command execution, file upload/download, and PHP code execution.
Classification
Working Poc 95%
Target:
PHP-CGI (versions affected by CVE-2024-4577 and CVE-2024-8926)
No auth needed
Prerequisites:
Target running vulnerable PHP-CGI · Network access to the target
nomisec
WORKING POC
31 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability. The exploit includes multi-threaded scanning, automatic path detection, and an interactive shell for vulnerable targets.
Classification
Working Poc 95%
Target:
PHP CGI (XAMPP)
No auth needed
Prerequisites:
Target running vulnerable PHP CGI configuration · Network access to the target
nomisec
WORKING POC
29 stars
by ZephrFish · remote
https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE
The repository contains functional exploit code in Go, Python, and Bash for CVE-2024-4577, a PHP-CGI argument injection vulnerability allowing remote code execution via manipulated query parameters. The scripts test for vulnerability by injecting PHP INI settings and checking for phpinfo() output.
Classification
Working Poc 95%
Target:
PHP-CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target must be running vulnerable PHP-CGI with exposed query parameter handling
nomisec
WORKING POC
25 stars
by BTtea · remote
https://github.com/BTtea/CVE-2024-4577-RCE-PoC
This repository contains a functional Python exploit for CVE-2024-4577, targeting a PHP-CGI remote code execution vulnerability. The script automates the exploitation process, including WAF bypass techniques, payload encoding, and command execution.
Classification
Working Poc 95%
Target:
PHP-CGI (specific version not specified)
No auth needed
Prerequisites:
Network access to vulnerable PHP-CGI endpoint · Python environment with required libraries
nomisec
WORKING POC
24 stars
by gh-ost00 · remote
https://github.com/gh-ost00/CVE-2024-4577-RCE
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting PHP versions 8.1.x before 8.1.29, 8.2.x before 8.2.20, and 8.3.x before 8.3.8. The exploit leverages the 'Best-Fit' character replacement behavior in Windows to inject PHP options, allowing remote code execution.
Classification
Working Poc 95%
Target:
PHP (8.1.x < 8.1.29, 8.2.x < 8.2.20, 8.3.x < 8.3.8) with CGI mode on Windows
No auth needed
Prerequisites:
Target must be running PHP in CGI mode on Windows · Target must be using a vulnerable PHP version · Target must be accessible via HTTP
nomisec
SCANNER
22 stars
by huseyinstif · remote
https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template
This repository contains a Nuclei template designed to detect the PHP CGI Argument Injection vulnerability (CVE-2024-4577) by sending crafted HTTP requests and checking for a specific MD5 hash in the response. It does not include exploit code but provides a detection mechanism.
Classification
Scanner 95%
Target:
PHP CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHP CGI · Target must have PHP CGI exposed and accessible
nomisec
WORKING POC
12 stars
by gotr00t0day · remote
https://github.com/gotr00t0day/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, an argument injection vulnerability in PHP. The exploit leverages PHP's allow_url_include and auto_prepend_file directives to achieve remote code execution (RCE) by injecting malicious input via a crafted HTTP request.
Classification
Working Poc 95%
Target:
PHP (specific version not specified)
No auth needed
Prerequisites:
Target must have PHP with allow_url_include and auto_prepend_file directives enabled · Network access to the target server
nomisec
WORKING POC
9 stars
by manuelinfosec · remote
https://github.com/manuelinfosec/CVE-2024-4577
This repository contains a functional Python script that exploits CVE-2024-4577, a PHP CGI argument injection vulnerability. The exploit sends crafted HTTP requests with a soft hyphen (0xAD) to bypass parameter parsing, potentially leading to arbitrary command execution.
Classification
Working Poc 90%
Target:
PHP versions before 7.4.29 and 8.0.19 on Windows running php-cgi
No auth needed
Prerequisites:
Python 3 · requests library · target running vulnerable PHP CGI configuration
nomisec
WORKING POC
8 stars
by K3ysTr0K3R · poc
https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, and 8.3.* before 8.3.8 on Windows systems. The exploit leverages Windows' 'Best-Fit' character replacement behavior to inject PHP options, enabling remote code execution.
Classification
Working Poc 95%
Target:
PHP (8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8) with Apache and PHP-CGI on Windows
No auth needed
Prerequisites:
Target must be running vulnerable PHP version on Windows with PHP-CGI and specific code pages configured
nomisec
WORKING POC
8 stars
by l0n3m4n · remote
https://github.com/l0n3m4n/CVE-2024-4577-RCE
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting Windows systems. The script includes both scanning and exploitation capabilities, leveraging the %AD character to inject PHP options and execute arbitrary code.
Classification
Working Poc 95%
Target:
PHP (8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8) on Windows with Apache and PHP-CGI
No auth needed
Prerequisites:
Target must be running PHP in CGI mode on Windows · Target must be using a vulnerable PHP version
nomisec
WORKING POC
5 stars
by longhoangth18 · remote
https://github.com/longhoangth18/CVE-2024-4577
The repository contains a functional Python script that scans for and exploits CVE-2024-4577, a PHP CGI Argument Injection vulnerability leading to Remote Code Execution (RCE). The exploit leverages crafted HTTP requests to inject PHP directives and execute arbitrary code.
Classification
Working Poc 95%
Target:
PHP (CGI mode, versions 8.1, 8.2, 8.3)
No auth needed
Prerequisites:
Target running PHP in CGI mode · Network access to the target
nomisec
WORKING POC
5 stars
by aavamin · poc
https://github.com/aavamin/cve-2024-4577
This repository contains a functional exploit for CVE-2024-4577, targeting PHP-CGI misconfigurations to achieve remote code execution (RCE) via crafted HTTP requests. The script automates the exploitation process, allowing arbitrary PHP code execution through the `auto_prepend_file` parameter.
Classification
Working Poc 95%
Target:
PHP-CGI (Windows)
No auth needed
Prerequisites:
PHP-CGI enabled with vulnerable configuration · Network access to the target
nomisec
WORKING POC
5 stars
by bibo318 · remote
https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability on Windows systems. The script includes multiple payloads to test and exploit the vulnerability, allowing remote code execution by manipulating PHP CGI parameters.
Classification
Working Poc 95%
Target:
PHP (8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8) with Apache and PHP-CGI on Windows
No auth needed
Prerequisites:
Target running vulnerable PHP version on Windows with Apache and PHP-CGI · Access to a vulnerable endpoint (e.g., /php-cgi/php-cgi.exe or a .php script in CGI mode)
nomisec
WORKING POC
5 stars
by 0x20c · remote
https://github.com/0x20c/CVE-2024-4577-nuclei
This repository contains functional Nuclei templates for CVE-2024-4577, a PHP CGI argument injection vulnerability allowing unauthenticated RCE via crafted HTTP requests with the 0xAD character sequence. The templates test multiple paths and payloads to trigger arbitrary code execution.
Classification
Working Poc 95%
Target:
PHP CGI (XAMPP and other configurations)
No auth needed
Prerequisites:
Target running vulnerable PHP CGI configuration · Network access to the target
github
WORKING POC
4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2024/CVE-2024-4577.md
This repository contains functional exploit code for multiple CVEs, including remote file inclusion, path traversal, and unauthorized file deletion vulnerabilities. Each PoC includes specific HTTP requests or commands to exploit the vulnerabilities.
Classification
Working Poc 95%
Target:
Various (WordPress plugins, QNAP Photo Station, IBM Data Risk Manager, Wipro Holmes Orchestrator)
No auth needed
Prerequisites:
Network access to the target system · Specific software versions as listed in the PoCs
nomisec
WORKING POC
4 stars
by CirqueiraDev · remote
https://github.com/CirqueiraDev/MassExploit-CVE-2024-4577
The repository contains a functional Python script that exploits CVE-2024-4577, a PHP-CGI argument injection vulnerability, by sending a crafted HTTP request with a PHP payload to test for remote code execution (RCE). The script checks for vulnerability by analyzing the server's response for PHP info output.
Classification
Working Poc 95%
Target:
PHP (Windows installations) versions 8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29
No auth needed
Prerequisites:
List of target domains · Network access to target servers
nomisec
WORKING POC
4 stars
by Sh0ckFR · remote
https://github.com/Sh0ckFR/CVE-2024-4577
This repository contains a functional Python script that tests for CVE-2024-4577, a PHP-CGI argument injection vulnerability. The script sends a crafted POST request to common PHP-CGI paths and checks if the target is vulnerable by attempting to execute arbitrary PHP code.
Classification
Working Poc 95%
Target:
PHP-CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target must have PHP-CGI exposed and vulnerable to CVE-2024-4577
nomisec
WORKING POC
3 stars
by ibrahmsql · remote
https://github.com/ibrahmsql/CVE-2024-4577
This repository contains a functional Python exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability allowing remote code execution. The exploit automates the process of testing multiple CGI paths, executing commands, and providing an interactive shell.
Classification
Working Poc 95%
Target:
PHP < 8.3.4, PHP < 8.2.17, PHP < 8.1.27
No auth needed
Prerequisites:
Target running vulnerable PHP CGI version · Network access to the target
nomisec
SCANNER
3 stars
by JeninSutradhar · remote
https://github.com/JeninSutradhar/CVE-2024-4577-checker
This repository contains a Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI on Windows systems. The script checks for the vulnerability by sending crafted HTTP requests and analyzing responses, but it does not include exploit code for actual exploitation.
Classification
Scanner 95%
Target:
PHP-CGI on Windows (versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8)
No auth needed
Prerequisites:
List of domains to scan · Bash environment · curl installed
nomisec
SCANNER
3 stars
by zomasec · poc
https://github.com/zomasec/CVE-2024-4577
This repository contains a Go-based scanner for CVE-2024-4577, a PHP CGI argument injection vulnerability on Windows. It checks for vulnerability by sending a crafted HTTP request and analyzing the response for PHP version info, but does not include actual exploit code for RCE.
Classification
Scanner 90%
Target:
PHP on Windows (all versions)
No auth needed
Prerequisites:
PHP running in CGI mode or exposed PHP binary in CGI directory
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-4577
The repository contains a scanner for CVE-2024-21762, which checks for the presence of the vulnerability in Fortinet SSL VPN interfaces. It includes Python scripts that send crafted HTTP requests to detect if a target is vulnerable.
Classification
Scanner 90%
Target:
Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target · SSL/TLS connectivity
nomisec
WORKING POC
2 stars
by byteReaper77 · remote
https://github.com/byteReaper77/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, targeting PHP CGI versions 8.1, 8.2, and 8.3 on Windows. The exploit leverages crafted HTTP POST requests to achieve remote code execution (RCE) and includes features like reverse shell functionality.
Classification
Working Poc 95%
Target:
PHP CGI 8.1, 8.2, 8.3 on Windows
No auth needed
Prerequisites:
Target running vulnerable PHP CGI version on Windows · Network access to the target
nomisec
WORKING POC
2 stars
by phirojshah · remote
https://github.com/phirojshah/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting PHP versions 8.1.x, 8.2.x, and 8.3.x on Windows systems. The exploit includes both scanning and exploitation capabilities, leveraging the %AD character to inject PHP options and execute arbitrary code.
Classification
Working Poc 95%
Target:
PHP (8.1.x < 8.1.29, 8.2.x < 8.2.20, 8.3.x < 8.3.8) on Windows with Apache and PHP-CGI
No auth needed
Prerequisites:
Target must be running PHP in CGI mode on Windows with vulnerable versions · Target must be accessible via HTTP/HTTPS
nomisec
WORKING POC
2 stars
by VictorShem · remote
https://github.com/VictorShem/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, leveraging PHP CGI argument injection via the 0xAD character to achieve remote code execution on XAMPP servers. The YAML file defines a Nuclei template that crafts malicious HTTP requests to inject PHP directives and execute arbitrary code.
Classification
Working Poc 95%
Target:
XAMPP (PHP CGI)
No auth needed
Prerequisites:
Target running vulnerable XAMPP with PHP CGI exposed
nomisec
WORKING POC
2 stars
by AlperenY-cs · poc
https://github.com/AlperenY-cs/CVE-2024-4577
This repository provides a functional proof-of-concept exploit for CVE-2024-4577, a PHP-CGI argument injection vulnerability leading to remote code execution. It includes detailed setup instructions for a lab environment and a working exploit payload.
Classification
Working Poc 95%
Target:
PHP-CGI (PHP 8.1.25)
No auth needed
Prerequisites:
XAMPP with PHP 8.1.25 · Windows system with specific locale settings (Japanese, Traditional Chinese, or Simplified Chinese) · Apache configured to run PHP in CGI mode
nomisec
WORKING POC
2 stars
by d3ck4 · remote
https://github.com/d3ck4/Shodan-CVE-2024-4577
This script leverages Shodan to find Apache (Win64) PHP/8.2.12 targets and tests for CVE-2024-4577 by sending crafted requests to exploit PHP-CGI argument injection. It checks for vulnerability by injecting PHP code via `php://input` and verifying execution.
Classification
Working Poc 90%
Target:
PHP-CGI (Apache Win64 PHP/8.2.12)
No auth needed
Prerequisites:
Shodan API key · Internet access · Vulnerable PHP-CGI endpoint
nomisec
SCANNER
1 stars
by ywChen-NTUST · remote
https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner
This repository contains a scanner for CVE-2024-4577, which targets PHP CGI RCE vulnerabilities. It checks for connectivity, PHP CGI existence, PHP version, and attempts to exploit the vulnerability by sending a crafted request to trigger RCE.
Classification
Scanner 95%
Target:
PHP CGI (versions 5.0.0 - 8.1.28, 8.2.0 - 8.2.19, 8.3.0 - 8.3.7)
No auth needed
Prerequisites:
Target URL list · PHP CGI endpoint accessibility
nomisec
WORKING POC
1 stars
by sug4r-wr41th · remote
https://github.com/sug4r-wr41th/CVE-2024-4577
This repository contains a functional Python-based exploit for CVE-2024-4577, a PHP CGI vulnerability that allows remote code execution (RCE) by manipulating query parameters and sending a crafted POST request. The exploit leverages PHP's configuration directives to include and execute arbitrary code from the input stream.
Classification
Working Poc 95%
Target:
PHP CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
PHP CGI enabled on the target server · Network access to the target host and port
nomisec
SUSPICIOUS
1 stars
by ggfzx · remote
https://github.com/ggfzx/CVE-2024-4577
The repository claims to be a PoC for CVE-2024-4577 but lacks actual exploit code, instead providing a vague description and a screenshot. It includes generic options like proxy support and threading, which are typical of suspicious repos.
Classification
Suspicious 80%
Target:
PHP-CGI
No auth needed
nomisec
WRITEUP
1 stars
by PhinehasNarh · poc
https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthrough
This is a technical writeup detailing the investigation of CVE-2024-4577, a PHP-CGI vulnerability. It includes steps for identifying vulnerable versions, analyzing logs, and confirming exploitation through process execution.
Classification
Writeup 90%
Target:
PHP-CGI (PHP 8.2.19)
No auth needed
Prerequisites:
Vulnerable PHP version (8.2.19) · PHP-CGI enabled in Apache configuration
nomisec
SCANNER
1 stars
by nemu1k5ma · remote
https://github.com/nemu1k5ma/CVE-2024-4577
This repository contains a Python script designed to scan for CVE-2024-4577, a vulnerability in PHP-CGI. The script sends crafted HTTP requests to detect the presence of the vulnerability by checking for a specific MD5 hash in the response, but it does not include exploit code for achieving RCE.
Classification
Scanner 95%
Target:
PHP-CGI (specific version not specified)
No auth needed
Prerequisites:
List of target URLs in CSV format (FOFA export)
nomisec
SCANNER
1 stars
by 0XFFFF-XD · poc
https://github.com/0XFFFF-XD/CVE-2024-4577-PHP-CGI-RCE
The repository contains a Nuclei template (YAML) designed to detect CVE-2024-4577, a PHP CGI argument injection vulnerability on Windows systems. It sends crafted HTTP requests to check for the presence of the vulnerability but does not include functional exploit code for RCE.
Classification
Scanner 90%
Target:
PHP CGI on Windows (versions 8.3.0-8.3.7, 8.2.0-8.2.19, 8.1.0-8.1.28, and XAMPP <= 8.2.12/8.1.25/8.0.30)
No auth needed
Prerequisites:
PHP CGI running on Windows with vulnerable versions · Access to the target web server
nomisec
SCANNER
1 stars
by Sysc4ll3r · remote
https://github.com/Sysc4ll3r/CVE-2024-4577
This repository contains a Nuclei template for detecting PHP CGI Argument Injection (CVE-2024-4577). It sends crafted HTTP requests to check for vulnerability indicators but does not include functional exploit code for achieving RCE.
Classification
Scanner 90%
Target:
PHP CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
PHP CGI exposed via web server · Access to target web server
nomisec
SCANNER
1 stars
by Wh02m1 · remote
https://github.com/Wh02m1/CVE-2024-4577
This repository contains a Nuclei template for detecting CVE-2024-4577, a PHP CGI argument injection vulnerability. The template sends a crafted POST request to test for the vulnerability by attempting to enable dangerous PHP configurations and execute arbitrary code via URL parameters.
Classification
Scanner 90%
Target:
PHP CGI configurations
No auth needed
Prerequisites:
PHP CGI mode enabled · Access to a vulnerable endpoint
nomisec
WORKING POC
1 stars
by taida957789 · poc
https://github.com/taida957789/CVE-2024-4577
This repository contains a functional Proof of Concept (PoC) for CVE-2024-4577, exploiting a PHP CGI argument injection vulnerability in XAMPP's default configuration. The PoC uses a crafted curl command to execute arbitrary code (e.g., 'calc') by manipulating PHP CGI parameters.
Classification
Working Poc 90%
Target:
XAMPP (PHP CGI)
No auth needed
Prerequisites:
XAMPP with default PHP CGI configuration · Network access to the target server
nomisec
WORKING POC
1 stars
by Junp0 · remote
https://github.com/Junp0/CVE-2024-4577
This repository contains a functional Python exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability affecting Windows systems. The exploit sends a crafted POST request to inject PHP code via the `allow_url_include` and `auto_prepend_file` directives, achieving remote code execution.
Classification
Working Poc 100%
Target:
PHP (Windows) versions 8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29
No auth needed
Prerequisites:
Vulnerable PHP version running on Windows · Access to a PHP CGI endpoint
nomisec
WRITEUP
by rayngnpc · poc
https://github.com/rayngnpc/CVE-2024-4577-rayng
This repository provides a comprehensive detection engineering lab for CVE-2024-4577, including detailed technical analysis, detection rules, and a lab environment setup. It focuses on detection methodologies rather than providing a functional exploit.
Classification
Writeup 95%
Target:
PHP 8.1 < 8.1.29, 8.2 < 8.2.20, 8.3 < 8.3.8 (Windows + CGI mode)
No auth needed
Prerequisites:
Windows operating system · Apache with CGI/FastCGI handler for PHP · Specific locale settings (Chinese, Japanese, etc.)
nomisec
WORKING POC
by Skycritch · remote
https://github.com/Skycritch/CVE-2024-4577
This repository contains a functional Python exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability. The PoC sends a crafted POST request with malicious PHP code to achieve remote code execution (RCE) on vulnerable PHP installations.
Classification
Working Poc 95%
Target:
PHP CGI (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHP CGI · PHP CGI must be accessible via HTTP/HTTPS
nomisec
WORKING POC
by a1ex-var1amov · remote
https://github.com/a1ex-var1amov/ctf-cve-2024-4577
This repository contains functional exploit code for CVE-2024-4577, a PHP CGI argument injection vulnerability, including scripts for testing, file reading, command execution, and container escape. The detailed walkthrough explains the vulnerability mechanics and provides step-by-step exploitation guidance.
Classification
Working Poc 95%
Target:
PHP (8.1.x < 8.1.21, 8.2.x < 8.2.8, 8.3.x < 8.3.1)
No auth needed
Prerequisites:
PHP running in CGI mode · Access to vulnerable endpoint
nomisec
SCANNER
by InfoSec-DB · poc
https://github.com/InfoSec-DB/PHPCGIScanner
This repository contains a Python-based scanner for detecting the presence of PHP-CGI endpoints and checking if the PHP version is vulnerable to CVE-2024-4577. It does not include exploit code but performs version checks and SAPI detection.
Classification
Scanner 95%
Target:
PHP (versions 8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
Network access to the target host · PHP-CGI endpoint exposed
nomisec
WORKING POC
by Ianthinus · remote
https://github.com/Ianthinus/CVE-2024-4577
This repository contains a functional exploit PoC for CVE-2024-4577, demonstrating a PHP CGI argument injection vulnerability. It includes a test script and environment checker to verify the vulnerable setup.
Classification
Working Poc 95%
Target:
PHP CGI (versions 8.1.0 to 8.1.29)
No auth needed
Prerequisites:
PHP CGI mode · Windows OS · Vulnerable PHP version (8.1.0 to 8.1.29) · Specific locale settings (Japanese/Chinese)
nomisec
WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2024-4577
This repository contains a functional scanner and exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability. The scanner checks for vulnerability by sending a PHP payload that prints a specific MD5 hash, while the exploit executes arbitrary system commands on vulnerable targets.
Classification
Working Poc 95%
Target:
PHP CGI on Windows systems
No auth needed
Prerequisites:
PHP running in CGI mode on Windows · Access to vulnerable endpoints
nomisec
WORKING POC
by mananjain61 · client-side
https://github.com/mananjain61/PHP-CGI-INTERNAL-RCE
This repository contains a functional PoC that chains CVE-2024-4577 with DNS rebinding to achieve RCE on internal PHP-CGI instances. It uses DuckDNS for dynamic DNS updates and serves a malicious payload to exploit vulnerable local servers.
Classification
Working Poc 95%
Target:
PHP-CGI (XAMPP/local servers)
No auth needed
Prerequisites:
DuckDNS account · Publicly accessible server · Vulnerable PHP-CGI instance on target network
nomisec
WORKING POC
by KimJuhyeong95 · remote
https://github.com/KimJuhyeong95/cve-2024-4577
This repository contains a functional Python script that tests for CVE-2024-4577, a PHP CGI vulnerability on Windows systems allowing arbitrary code execution via multibyte character bypass. The script sends a crafted POST request with a PHP payload to detect if the target is vulnerable.
Classification
Working Poc 95%
Target:
PHP (Windows CGI mode)
No auth needed
Prerequisites:
Target running PHP in CGI mode on Windows · Network access to the target
nomisec
WORKING POC
by tntrock · remote
https://github.com/tntrock/CVE-2024-4577_PowerShell
This repository contains a functional PowerShell script that exploits CVE-2024-4577, a PHP-CGI argument injection vulnerability, by sending crafted HTTP requests to scan a subnet and execute arbitrary commands (e.g., 'whoami') on vulnerable targets.
Classification
Working Poc 95%
Target:
PHP-CGI (php-cgi.exe)
No auth needed
Prerequisites:
Network access to vulnerable PHP-CGI endpoints · PHP-CGI with exposed php-cgi.exe
nomisec
WORKING POC
by Gill-Singh-A · remote
https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit
This repository contains a functional Python exploit for CVE-2024-4577, a PHP CGI argument injection vulnerability. The exploit sends crafted HTTP requests to inject PHP directives and achieve remote code execution (RCE) on vulnerable Windows systems.
Classification
Working Poc 95%
Target:
PHP (CGI mode) on Windows
No auth needed
Prerequisites:
Vulnerable PHP version running in CGI mode · Network access to the target
github
WORKING POC
by Anzinius · pythonpoc
https://github.com/Anzinius/CVE-PoC-Collection/tree/main/cve-2024-4577
The repository contains functional exploit code for CVE-2017-5487, demonstrating an information disclosure vulnerability in WordPress via the /wp-json/wp/v2/users endpoint. The exploit sends a GET request to retrieve user details without proper access controls.
Classification
Working Poc 95%
Target:
WordPress versions 4.7.0 and earlier
No auth needed
Prerequisites:
Target WordPress instance with vulnerable version · Network access to the target
nomisec
SCANNER
by wilss0n · poc
https://github.com/wilss0n/CVE-2024-4577
The repository contains a Python script that scans for CVE-2024-4577 by sending crafted HTTP requests to test for potential RCE vulnerabilities in PHP CGI configurations. It checks for specific responses indicating vulnerability but does not include actual exploit code for command execution.
Classification
Scanner 90%
Target:
PHP (8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
PHP CGI misconfiguration · Exposed PHP CGI endpoint
nomisec
WORKING POC
by Didarul342 · remote
https://github.com/Didarul342/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, an argument injection vulnerability in PHP. The exploit sends a crafted POST request to inject PHP code via the `allow_url_include` and `auto_prepend_file` parameters, achieving remote code execution (RCE).
Classification
Working Poc 95%
Target:
PHP (specific version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHP · Target must have the vulnerable endpoint exposed
nomisec
WRITEUP
by tpdlshdmlrkfmcla · poc
https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577
The repository provides a technical explanation of CVE-2024-4577, an argument injection vulnerability in PHP-CGI mode on Windows systems. It describes how the Best-fit Unicode character mapping feature can lead to incorrect encoding conversion, potentially allowing remote code execution.
Classification
Writeup 80%
Target:
PHP-CGI (Windows)
No auth needed
Prerequisites:
PHP running in CGI mode on Windows · Exposure of PHP-CGI to untrusted input
nomisec
WORKING POC
by Dejavu666 · remote
https://github.com/Dejavu666/CVE-2024-4577
This repository contains functional exploit code for CVE-2024-4577, a PHP remote code execution vulnerability. The exploit leverages PHP configuration manipulation via HTTP parameters to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
PHP (versions 5 and 7)
No auth needed
Prerequisites:
Target running vulnerable PHP version · Ability to send HTTP POST requests to the target
nomisec
WORKING POC
by ahmetramazank · poc
https://github.com/ahmetramazank/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI RCE vulnerability on Windows. It includes PowerShell scripts for reverse shell and ransomware deployment, demonstrating the exploit's potential impact.
Classification
Working Poc 95%
Target:
PHP CGI on Windows (versions 8.3.x, 8.2.x, 8.1.x, and earlier)
No auth needed
Prerequisites:
Vulnerable PHP CGI configuration on Windows · Network access to the target server
nomisec
WORKING POC
by bughuntar · remote
https://github.com/bughuntar/CVE-2024-4577
This repository contains a functional Python script that exploits CVE-2024-4577, a PHP CGI remote code execution vulnerability. The exploit sends crafted POST requests with specific query parameters to target hosts, checks for vulnerability by verifying the presence of 'PHP Version' in the response, and supports multi-threaded execution for efficiency.
Classification
Working Poc 95%
Target:
PHP CGI (php-cgi.exe)
No auth needed
Prerequisites:
List of target hosts · Python 3.6+ · requests and colorama libraries
nomisec
SUSPICIOUS
by Entropt · poc
https://github.com/Entropt/CVE-2024-4577_Analysis
The repository lacks actual exploit code or technical analysis, instead providing a vague README with a link to NVD. No technical details, code, or proof-of-concept are included.
Classification
Suspicious 90%
Target:
unspecified
No auth needed
nomisec
WORKING POC
by Jcccccx · remote
https://github.com/Jcccccx/CVE-2024-4577
The repository contains functional exploit code for CVE-2024-4577, a PHP-CGI remote code execution vulnerability affecting PHP versions 8.3 < 8.3.8, 8.2 < 8.2.20, and 8.1 < 8.1.29. The exploit leverages crafted HTTP requests to execute arbitrary commands via PHP-CGI parameter injection.
Classification
Working Poc 95%
Target:
PHP (8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
Target must be running vulnerable PHP-CGI version · PHP-CGI must be accessible via HTTP
nomisec
WORKING POC
by a-roshbaik · infoleak
https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE
This repository contains a functional exploit for CVE-2024-4577, a PHP-CGI RCE vulnerability affecting Windows PHP versions. The exploit leverages FastCGI protocol manipulation and the `cgi.force_redirect` bypass to achieve remote code execution.
Classification
Working Poc 95%
Target:
PHP (Windows) 5.x-8.3.x, XAMPP (Windows) 5.x-8.2.x
No auth needed
Prerequisites:
PHP-CGI enabled on Windows · Network access to target
nomisec
SCANNER
by gmh5225 · remote
https://github.com/gmh5225/CVE-2024-4577-PHP-RCE
The script checks for CVE-2024-4577 by sending a crafted HTTP request to test if PHP's allow_url_include and auto_prepend_file directives can be manipulated via URL-encoded parameters. It does not execute arbitrary commands but verifies vulnerability by checking for PHP info disclosure.
Classification
Scanner 90%
Target:
PHP (versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target server with vulnerable PHP configuration · Network access to the target
nomisec
WORKING POC
by charis3306 · remote
https://github.com/charis3306/CVE-2024-4577
This repository contains a functional exploit for CVE-2024-4577, a PHP-CGI remote code execution vulnerability on Windows platforms. The exploit leverages the Best-Fit character conversion feature in Windows to bypass patches for previous CGI vulnerabilities (CVE-2012-1823 and CVE-2012-2311) and execute arbitrary PHP code.
Classification
Working Poc 95%
Target:
PHP-CGI on Windows (versions 5.x, 7.x, 8.0.x, 8.1.x < 8.1.29, 8.2.x < 8.2.20, 8.3.x < 8.3.8)
No auth needed
Prerequisites:
Target running vulnerable PHP-CGI on Windows with specific language settings (e.g., Chinese, Japanese)
nomisec
SCANNER
by olebris · remote
https://github.com/olebris/CVE-2024-4577
This script checks for CVE-2024-4577 by sending a crafted POST request to test for PHP remote code execution via URL parameter manipulation. It verifies vulnerability by checking if the response contains 'PHP Version'.
Classification
Scanner 90%
Target:
PHP (unspecified version)
No auth needed
Prerequisites:
List of target domains in a text file
nomisec
WORKING POC
by jakabakos · remote
https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE
The repository contains a functional Python exploit for CVE-2024-4577, which leverages PHP CGI argument injection to achieve remote code execution (RCE) on vulnerable systems. The exploit sends a crafted HTTP request with malicious arguments to execute arbitrary commands or PHP code.
Classification
Working Poc 95%
Target:
PHP CGI (specific versions affected by CVE-2024-4577)
No auth needed
Prerequisites:
Target running PHP CGI in vulnerable locales (Traditional Chinese, Simplified Chinese, Japanese) on Windows · Network access to the target server
nomisec
WORKING POC
by bl4cksku11 · remote
https://github.com/bl4cksku11/CVE-2024-4577
The repository contains a functional exploit script for CVE-2024-4577, which targets PHP CGI implementations on Windows systems. The script tests multiple payloads to detect and exploit the vulnerability by injecting PHP code via malformed arguments.
Classification
Working Poc 90%
Target:
PHP CGI (Windows)
No auth needed
Prerequisites:
Target running PHP CGI on Windows · Accessible CGI endpoints
nomisec
WORKING POC
by dbyMelina · remote
https://github.com/dbyMelina/CVE-2024-4577
The repository contains a functional Python script that exploits CVE-2024-4577, a vulnerability in PHP CGI allowing remote code execution via crafted HTTP requests. The PoC sends a malicious request to enable URL inclusion and auto-prepend a PHP payload, verifying exploitation by checking for a specific string in the response.
Classification
Working Poc 95%
Target:
PHP (8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
Target running vulnerable PHP version with CGI enabled · Network access to the target
nomisec
SCANNER
by graphite-org · poc
https://github.com/graphite-org/CVE-2024-4577
This repository contains a bash script that checks for CVE-2024-4577 by sending a crafted POST request to a list of domains and analyzing the response for signs of vulnerability. It does not exploit the vulnerability but detects it by checking if the response contains 'PHP Version'.
Classification
Scanner 95%
Target:
PHP (specific version not specified)
No auth needed
Prerequisites:
List of domains to check · GNU Parallel installed
nomisec
WORKING POC
by WanLiChangChengWanLiChang · remote
https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP
This repository contains a functional exploit for CVE-2024-4577, a PHP CGI RCE vulnerability on Windows systems. The exploit uses a threaded approach to target XAMPP installations, leveraging PHP's auto_prepend_file directive to execute arbitrary commands.
Classification
Working Poc 95%
Target:
XAMPP (PHP CGI on Windows)
No auth needed
Prerequisites:
Target must be running XAMPP with PHP CGI on Windows (Chinese/Japanese OS) · PHP CGI must be accessible via HTTP
nomisec
SCANNER
by Ra1n-60W · poc
https://github.com/Ra1n-60W/CVE-2024-4577
The repository contains a Python script that scans for a CGI vulnerability by sending crafted HTTP requests to test URLs. It checks for the presence of a specific response pattern but does not include exploit code for achieving remote code execution.
Classification
Scanner 90%
Target:
PHP CGI (unspecified version)
No auth needed
Prerequisites:
Target URLs with exposed CGI endpoints
nomisec
STUB
by princew88 · poc
https://github.com/princew88/CVE-2024-4577
The repository contains only a README.md file with the CVE identifier and no additional technical details or exploit code. It is a placeholder with minimal content.
Target:
unknown
No auth needed
vulncheck_xdb
SCANNER
remote
https://github.com/mistakes1337/CVE-2024-4577
The repository contains a Python script that scans for CVE-2024-4577 by sending crafted HTTP requests to test for potential RCE vulnerabilities in PHP CGI configurations. It does not include actual exploit code for achieving RCE but checks for indicators of vulnerability.
Classification
Scanner 90%
Target:
PHP (8.3 < 8.3.8, 8.2 < 8.2.20, 8.1 < 8.1.29)
No auth needed
Prerequisites:
PHP CGI mode enabled · Access to target URL
vulncheck_xdb
WRITEUP
remote
https://github.com/user20252228/php-cgi-cve-2024-4577
The repository provides a technical explanation of CVE-2024-4577, an argument injection vulnerability in PHP-CGI affecting Windows systems. It describes how the Best-fit Unicode character mapping feature can be exploited to bypass security measures, leading to potential remote code execution.
Classification
Writeup 80%
Target:
PHP-CGI (Windows environments)
No auth needed
Prerequisites:
PHP running in CGI mode on Windows · Exposure to external networks
vulncheck_xdb
WORKING POC
remote
https://github.com/VictorShem/QVD-2024-26473
The repository contains a functional exploit for CVE-2024-4577, leveraging PHP CGI argument injection via the 0xAD character to achieve remote code execution on XAMPP servers. The YAML file includes a crafted HTTP request with a malicious payload to enable arbitrary code execution.
Classification
Working Poc 95%
Target:
XAMPP (PHP CGI)
No auth needed
Prerequisites:
XAMPP server with vulnerable PHP CGI configuration
vulncheck_xdb
SCANNER
remote
https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
The repository contains a Nuclei template for detecting CVE-2024-4577, a PHP CGI argument injection vulnerability on Windows systems. It checks for vulnerable endpoints by sending a crafted POST request and matching responses.
Classification
Scanner 90%
Target:
PHP CGI on Windows (versions 8.3.0-8.3.7, 8.2.0-8.2.19, 8.1.0-8.1.28, and XAMPP versions <= 8.2.12, 8.1.25, 8.0.30)
No auth needed
Prerequisites:
PHP CGI running on Windows with vulnerable language settings (e.g., Chinese, Japanese)
vulncheck_xdb
WORKING POC
remote
https://github.com/aaddmin1122345/cve-2024-4577
This repository contains a functional exploit for CVE-2024-4577, targeting PHP-CGI misconfigurations to achieve remote code execution (RCE). The script sends a crafted POST request to exploit vulnerable PHP-CGI configurations, allowing arbitrary PHP code execution.
Classification
Working Poc 95%
Target:
PHP-CGI (Windows)
No auth needed
Prerequisites:
PHP-CGI enabled with vulnerable configuration · Network access to the target
vulncheck_xdb
SCANNER
remote
https://github.com/BitMEXResearch/CVE-2024-4577
The repository contains a bash script that checks for CVE-2024-4577 by sending a crafted POST request to a list of domains and analyzing the response for PHP version information. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 90%
Target:
PHP applications with vulnerable configurations
No auth needed
Prerequisites:
list of target domains · GNU Parallel installed
vulncheck_xdb
WORKING POC
remote
https://github.com/0xPugal/my-nuclei-templates
The repository contains functional Nuclei templates for detecting and exploiting multiple vulnerabilities, including CVE-2024-4577 (PHP-CGI argument injection leading to RCE). The templates are well-structured and include specific HTTP requests to trigger and verify vulnerabilities.
Classification
Working Poc 95%
Target:
PHP-CGI (CVE-2024-4577), Oracle E-Business Suite (CVE-2022-21500), Essential Grid (CVE-2023-47684), Pritunl VPN (CVE-2020-25200)
No auth needed
Prerequisites:
Network access to the target · PHP-CGI or other vulnerable software running
metasploit
WORKING POC
EXCELLENT
by Orange Tsai, watchTowr, sfewer-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/php_cgi_arg_injection_rce_cve_2024_4577.rb
This Metasploit module exploits CVE-2024-4577, a PHP CGI argument injection vulnerability affecting Windows systems with specific locale configurations. It leverages Unicode best-fit character conversion to inject malicious arguments and achieve remote code execution.
Classification
Working Poc 100%
Target:
PHP (CGI mode) on Windows, versions before 8.1.29, 8.2.20, and 8.3.8
No auth needed
Prerequisites:
Target system with vulnerable PHP version · Windows system with specific locale settings (e.g., Chinese or Japanese) · PHP running in CGI mode or directly exposed PHP binary