https://github.com/waived/cve-2024-4577-php-rce
Automated PHP remote code execution scanner for CVE-2024-4577
https://github.com/waived/cve-2024-4577-php-rce
cve-2024-4577 exploitation php-rce python3 remote-code-execution vuln-scanner
Last synced: 5 months ago
JSON representation
Automated PHP remote code execution scanner for CVE-2024-4577
- Host: GitHub
- URL: https://github.com/waived/cve-2024-4577-php-rce
- Owner: waived
- Created: 2024-07-15T21:31:14.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2024-09-06T02:10:35.000Z (9 months ago)
- Last Synced: 2024-11-08T14:26:40.832Z (6 months ago)
- Topics: cve-2024-4577, exploitation, php-rce, python3, remote-code-execution, vuln-scanner
- Language: Python
- Homepage:
- Size: 14.6 KB
- Stars: 4
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
CVE 2024-4577 (PHP Remote Code Execution) automated scanner by Waived
Affected versions: PHP 8.3,* < 8.3.8, 8.2.*<8.2.20, 8.1.*, 8.1.29
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-4577
https://www.exploit-db.com/exploits/52047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577Overview:
This is a scanner that probes web servers for the CVE 2024-4577 bug.Script is fully automated and multi-threaded. A timeout option in
seconds is provided for slower connections or servers with a high
latency.Please use responsibly! By using, modifying, or distributing this script the
end user hereby agrees to the LEGAL.txt statement provided in this repository.