Overview
- Description
- In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
- Source
- security@php.net
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Known exploits
Data from CISA
- Vulnerability name
- PHP-CGI OS Command Injection Vulnerability
- Exploit added on
- Jun 12, 2024
- Exploit action due
- Jul 3, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Social media
- Hype score
- Not currently trending
複数の攻撃者が PHP の欠陥 CVE-2024-4577 を悪用してマルウェアを配信 from https://t.co/yO2wtNGLK9 https://t.co/1mqTwc3ehh
@Banana27710055
31 Oct 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
( CVE-2024-4577 ) Using Burp Suite and Metasploit https://t.co/tsfrW6hwGB #Exploit https://t.co/CFliiQN8cM
@Nxploited
31 Oct 2024
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RedTail方面メモ(出前館事案) RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit https://t.co/ErkyV1jm8W CVE-2024-4577 Exploits in the Wild One Day After Disclosure https://t.co/XHZOoQFamF
@taku888infinity
30 Oct 2024
1473 Impressions
7 Retweets
15 Likes
3 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8DF5D29-9ADB-4CE9-9DCE-9FFECA97800C", "versionEndExcluding": "8.1.29", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A39988FF-D854-4277-9D66-6911AF371DD3", "versionEndExcluding": "8.2.20", "versionStartIncluding": "8.2.0" }, { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A", "versionEndExcluding": "8.3.8", "versionStartIncluding": "8.3.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" } ], "operator": "OR" } ] } ]