In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
References
Configurations
History
28 Mar 2025, 15:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows
Microsoft |
|
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
21 Mar 2025, 20:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.talosintelligence.com/new-persistent-attacks-japan/ - Exploit, Third Party Advisory |
14 Mar 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv - Broken Link, Exploit, Third Party Advisory |
20 Dec 2024, 18:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List, Third Party Advisory | |
References | () https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv - Exploit, Third Party Advisory | |
References | () https://github.com/rapid7/metasploit-framework/pull/19247 - Exploit, Issue Tracking, Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List | |
References | () https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 - Exploit, Third Party Advisory | |
References | () https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 - Exploit, Third Party Advisory |
Information
Published : 2024-06-09 20:15
Updated : 2025-03-28 15:12
NVD link : CVE-2024-4577
Mitre link : CVE-2024-4577
CVE.ORG link : CVE-2024-4577
JSON object : View
Products Affected
php
- php
fedoraproject
- fedora
microsoft
- windows
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')