← Zuruck zu CVEs
CVE-2024-4577
CRITICALCISA KEV9.8
Beschreibung
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/9/2024
Zuletzt geandert11/3/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerPHP Group
ProduktPHP
SchwachstellennamePHP-CGI OS Command Injection Vulnerability
KEV Aufnahmedatum2024-06-12
Behebungsfrist2024-07-03
Ransomware-NutzungKnown
Betroffene Produkte
fedoraproject:fedoramicrosoft:windowsphp:php
Schwachen (CWE)
CWE-78CWE-78
Referenzen
http://www.openwall.com/lists/oss-security/2024/06/07/1(security@php.net)
https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/(security@php.net)
https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html(security@php.net)
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/(security@php.net)
https://github.com/11whoami99/CVE-2024-4577(security@php.net)
https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv(security@php.net)
https://github.com/rapid7/metasploit-framework/pull/19247(security@php.net)
https://github.com/watchtowrlabs/CVE-2024-4577(security@php.net)
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE(security@php.net)
https://isc.sans.edu/diary/30994(security@php.net)
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/(security@php.net)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/(security@php.net)
https://security.netapp.com/advisory/ntap-20240621-0008/(security@php.net)
https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/(security@php.net)
https://www.php.net/ChangeLog-8.php#8.1.29(security@php.net)
https://www.php.net/ChangeLog-8.php#8.2.20(security@php.net)
https://www.php.net/ChangeLog-8.php#8.3.8(security@php.net)
http://www.openwall.com/lists/oss-security/2024/06/07/1(af854a3a-2127-422b-91ae-364da2661108)
https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/(af854a3a-2127-422b-91ae-364da2661108)
https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html(af854a3a-2127-422b-91ae-364da2661108)
https://blog.talosintelligence.com/new-persistent-attacks-japan/(af854a3a-2127-422b-91ae-364da2661108)
https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately(af854a3a-2127-422b-91ae-364da2661108)
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/11whoami99/CVE-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/19247(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/watchtowrlabs/CVE-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE(af854a3a-2127-422b-91ae-364da2661108)
https://isc.sans.edu/diary/30994(af854a3a-2127-422b-91ae-364da2661108)
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240621-0008/(af854a3a-2127-422b-91ae-364da2661108)
https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.1.29(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.2.20(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.3.8(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4577(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.