Files
vulhub/php/fpm/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

35 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# PHP-FPM FastCGI 未授权访问漏洞
PHP-FPMFastCGI 进程管理器)是一个替代性的 PHP FastCGI 实现为各种规模的网站提供了额外的功能特性特别适用于高负载网站。当配置不当时PHP-FPM 可能被直接通过 FastCGI 协议访问,允许攻击者执行任意 PHP 代码。
此漏洞发生在 PHP-FPM 在没有适当访问控制的情况下暴露在网络中,导致 FastCGI 接口可被未经授权访问。
参考链接:
- <https://www.leavesongs.com/PENETRATION/fastcgi-and-php-fpm.html>
- <https://www.php.net/manual/zh/install.fpm.php>
## 环境搭建
执行如下命令启动PHP-FPM服务器
```bash
docker compose up -d
```
服务启动后PHP-FPM 服务器将监听 9000 端口。
## 漏洞复现
漏洞利用脚本可在以下地址获取https://gist.github.com/phith0n/9615e2420f31048f7e30f3937356cf75
该脚本允许你:
1. 直接连接到 PHP-FPM 端口
2. 发送精心构造的 FastCGI 请求
3. 在目标服务器上执行任意 PHP 代码
成功利用结果:
![](1.jpg)