Skip to content

Commit 223c6fe

Browse files
committed
automatic module_metadata_base.json update
1 parent dc70aa0 commit 223c6fe

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166965,6 +166965,69 @@
166965166965
"session_types": false,
166966166966
"needs_cleanup": null
166967166967
},
166968+
"exploit_windows/http/php_cgi_arg_injection_rce_cve_2024_4577": {
166969+
"name": "PHP CGI Argument Injection Remote Code Execution",
166970+
"fullname": "exploit/windows/http/php_cgi_arg_injection_rce_cve_2024_4577",
166971+
"aliases": [
166972+
166973+
],
166974+
"rank": 600,
166975+
"disclosure_date": "2024-06-06",
166976+
"type": "exploit",
166977+
"author": [
166978+
"Orange Tsai",
166979+
"watchTowr",
166980+
"sfewer-r7"
166981+
],
166982+
"description": "This module exploits a PHP CGI argument injection vulnerability affecting PHP in certain configurations\n on a Windows target. A vulnerable configuration is locale dependant (such as Chinese or Japanese), such that\n the Unicode best-fit conversion scheme will unexpectedly convert a soft hyphen (0xAD) into a dash (0x2D)\n character. Additionally a target web server must be configured to run PHP under CGI mode, or directly expose\n the PHP binary. This issue has been fixed in PHP 8.3.8 (for the 8.3.x branch), 8.2.20 (for the 8.2.x branch),\n and 8.1.29 (for the 8.1.x branch). PHP 8.0.x and below are end of life and have note received patches.\n\n XAMPP is vulnerable in a default configuration, and we can target the /php-cgi/php-cgi.exe endpoint. To target\n an explicit .php endpoint (e.g. /index.php), the server must be configured to run PHP scripts in CGI mode.",
166983+
"references": [
166984+
"CVE-2024-4577",
166985+
"URL-https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/",
166986+
"URL-https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/"
166987+
],
166988+
"platform": "PHP,Windows",
166989+
"arch": "php, cmd",
166990+
"rport": 80,
166991+
"autofilter_ports": [
166992+
80,
166993+
8080,
166994+
443,
166995+
8000,
166996+
8888,
166997+
8880,
166998+
8008,
166999+
3000,
167000+
8443
167001+
],
167002+
"autofilter_services": [
167003+
"http",
167004+
"https"
167005+
],
167006+
"targets": [
167007+
"Windows PHP",
167008+
"Windows Command"
167009+
],
167010+
"mod_time": "2024-06-13 15:10:14 +0000",
167011+
"path": "/modules/exploits/windows/http/php_cgi_arg_injection_rce_cve_2024_4577.rb",
167012+
"is_install_path": true,
167013+
"ref_name": "windows/http/php_cgi_arg_injection_rce_cve_2024_4577",
167014+
"check": true,
167015+
"post_auth": false,
167016+
"default_credential": false,
167017+
"notes": {
167018+
"Stability": [
167019+
"crash-safe"
167020+
],
167021+
"Reliability": [
167022+
"repeatable-session"
167023+
],
167024+
"SideEffects": [
167025+
"ioc-in-logs"
167026+
]
167027+
},
167028+
"session_types": false,
167029+
"needs_cleanup": null
167030+
},
166968167031
"exploit_windows/http/plesk_mylittleadmin_viewstate": {
166969167032
"name": "Plesk/myLittleAdmin ViewState .NET Deserialization",
166970167033
"fullname": "exploit/windows/http/plesk_mylittleadmin_viewstate",

0 commit comments

Comments
 (0)