TROYANOSYVIRUS
Back to CVEs

CVE-2024-4577

CRITICALCISA KEV
9.8

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/9/2024
Last Modified11/3/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorPHP Group
ProductPHP
Vulnerability NamePHP-CGI OS Command Injection Vulnerability
KEV Date Added2024-06-12
Remediation Due Date2024-07-03
Ransomware UseKnown

Affected Products

fedoraproject:fedoramicrosoft:windowsphp:php

Weaknesses (CWE)

CWE-78CWE-78

References

http://www.openwall.com/lists/oss-security/2024/06/07/1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/11whoami99/CVE-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/19247(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/watchtowrlabs/CVE-2024-4577(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE(af854a3a-2127-422b-91ae-364da2661108)
https://isc.sans.edu/diary/30994(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240621-0008/(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.1.29(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.2.20(af854a3a-2127-422b-91ae-364da2661108)
https://www.php.net/ChangeLog-8.php#8.3.8(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.