-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add exploit module for the new PHP CGI Argument Injection vuln (CVE-2024-4577) #19247
Conversation
I haven't had a chance to play around with this bug in a test environment yet. I'm curious if we can use
|
Good idea, I did a quick check against a vulnerable XAMPP server in a Japanese locale, and a non vulnerable XAMPP server in an English locale. Unfortunately, both responses when I just used |
documentation/modules/exploit/windows/http/php_cgi_arg_injection_rce_cve_2024_4577.md
Outdated
Show resolved
Hide resolved
modules/exploits/windows/http/php_cgi_arg_injection_rce_cve_2024_4577.rb
Outdated
Show resolved
Hide resolved
Co-authored-by: jheysel-r7 <[email protected]>
Co-authored-by: jheysel-r7 <[email protected]>
Thanks for the great module @sfewer-r7! Testing was as expected on a Windows server 2022 configured with Japanese locale with xampp 8.2.12 installed. TestingWindows PHP
Windows Command
|
Release NotesWindows systems running Japanese or Chinese (simplified or traditional) locales are vulnerable to a PHP CGI argument injection vulnerability. This exploit module returns a session running in the context of the Administrator user. |
The (draft) pull request adds an exploit module for the new PHP CGI argument injection vulnerability disclosed yesterday. H/t to Orange Tsai who found the vuln (see the Devcore disclosure), and watchTowr for their analysis.
To-Do
Testing
I configured a Windows Server 2022 system with the Japanese locale (Code page 932). As XAMPP is known to be vulnerable in a default configuration, I installed XAMPP
8.2.12 / PHP 8.2.12
(direct download link here).The exploit supports both PHP payloads (
ARCH_PHP
) and command payloads (ARCH_CMD
). Note, for testing theARCH_CMD
payloads you may need to disable Defender if you are dropping a stock Meterpreter.Example: Windows PHP Payload
Example: Windows Command Payload