CVE-2024-4577
CVSS V2 None
CVSS V3 None
Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Overview
- CVE ID
- CVE-2024-4577
- Assigner
- php
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-06-09T19:42:36.464Z
- Last Modified Date
- 2024-06-09T19:42:36.464Z
Weakness Enumerations
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-4577 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-23 22:23:15 | Added to TrackCVE |