Skip to content

ZeroMemoryEx/PHP-CGI-INTERNAL-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

PHP-CGI-INTERNAL-RCE

image

  • This PoC demonstrates how an attacker can chain Orange Tsai's CVE-2024-4577 with DNS rebinding to achieve remote code execution on internal network infrastructure directly through the victim’s web browser. By bypassing Same-Origin Policy (SOP) and exploiting vulnerable PHP-CGI instances running on local XAMPP servers, internal development environments, or corporate networks, this attack enables full code execution on systems never intended to be exposed to the internet.

BLOG

Setup

  • Register at duckdns

  • Create a subdomain (e.g., example.duckdns.org)

  • Note your DuckDNS token from the dashboard

  • Configure server.py:

    DUCKDNS_DOMAIN = "your-subdomain"      # Your DuckDNS subdomain
    DUCKDNS_TOKEN = "your-token-here"      # Your DuckDNS token  
  • to configure a custom payload, locate this line in client.html and replace it with your payload.

    const payload = `<?php system('calc');?>;echo 1337; die;`;
  • Also, you can modify the list of IPs. As we explained in the article, if you want to implement internal network scanning, you can use the JavaScript snippet I showed there. In this PoC, I’ll be using a predefined list of common IPs to keep it simple and fast

Dependencies:

  • requests

VIDEO

22sGc.1.mp4

  • It never needed to be offline… to be safe."

About

Delivering PHP RCE (CVE-2024-4577) to the Local Network Servers

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published