In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
References
Configurations
Configuration 1 (hide)
|
History
13 Jun 2024, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-09 20:15
Updated : 2024-06-13 04:15
NVD link : CVE-2024-4577
Mitre link : CVE-2024-4577
CVE.ORG link : CVE-2024-4577
JSON object : View
Products Affected
php
- php
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
