CVE-2024-8926

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:*
cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:*
cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:*

History

24 Apr 2025, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/advisories/GHSA-vxpp-6299-mxw3', 'tags': ['Third Party Advisory'], 'source': 'security@php.net'}
  • () https://github.com/php/php-src/security/advisories/GHSA-p99j-rfp4-xqvq -

Information

Published : 2024-10-08 04:15

Updated : 2025-04-24 22:15


NVD link : CVE-2024-8926

Mitre link : CVE-2024-8926

CVE.ORG link : CVE-2024-8926


JSON object : View

Products Affected

php-fpm

  • php-fpm
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')