Skip to content

Chocapikk/CVE-2024-4577

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-4577: PHP CGI Argument Injection (XAMPP) 💀

Features ✨

  • Multi-threaded scanning
  • Single URL or bulk URL checks from a file
  • Interactive exploitation shell

Installation 💻

Get started by cloning the repository and installing dependencies:

git clone https://github.com/Chocapikk/CVE-2024-4577.git
cd CVE-2024-4577
pip install -r requirements.txt

Usage 🔑

Run CVE-2024-4577 with these examples:

# Test a single URL
python exploit.py --url "http://example.com/"

# Test multiple URLs from a file
python exploit.py --file urls.txt

# Save vulnerable URLs
python exploit.py --file urls.txt --output vulnerable_urls.txt

Ethical Disclaimer ⚠️

This tool is intended for ethical security testing only. Using it without authorization is illegal and unethical. Users are responsible for adhering to all relevant laws.

Personal Note on Public Disclosure 📘

I released my code publicly to address the irresponsible ways critical vulnerabilities are often disclosed. People have already shared the correct method to exploit this vulnerability, but many are still publishing flawed or fabricated exploits for attention. Additionally, media outlets tend to create unnecessary fear by broadcasting incorrect or unverified claims. This misleads everyone from the people who need to patch systems to researchers, and it negatively impacts the defensive side of cybersecurity. The lack of accuracy and accountability in these practices is very troubling to me.

About

PHP CGI Argument Injection vulnerability

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages