CVE-2024-4577 | PHP | RCE
| Vulnerability | CVE-2024-4577 |
|---|---|
| Type | Remote Code Execution PoC |
| Description | CVE-2024-4577 is a critical PHP vulnerability affecting Windows installations in CGI mode, specifically under Chinese and Japanese locales. The vulnerability arises from improper handling of Unicode characters, allowing command injection through a ‘soft hyphen’ (0xAD) that is interpreted as a regular hyphen by PHP, enabling remote code execution. |
| The Impact of the Bug | This vulnerability affects all versions of PHP installed on the Windows operating system and can be exploited to execute arbitrary code on the affected server. Impact:
|
| How to detect if you have a vulnerable application to this attack vector? | Detection: To determine if your application is vulnerable or if it has been exploited:
|
| Exploitation | Attackers can inject arguments like post method to gain control:http://www.victim.com/a.php?-d allow_url_include=1 -d auto_prepend_file=php://inputhttp body : <?php system('calc')?> |
| References | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ https://github.com/watchtowrlabs/CVE-2024-4577 https://m.blog.naver.com/information_schema/223474001322 |