mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 10:16:59 +00:00
Create XAMPP_PHP-CGI_Windows_Code_Execution_Vulnerability.md
This commit is contained in:
parent
291e44369d
commit
6669c77323
13
XAMPP_PHP-CGI_Windows_Code_Execution_Vulnerability.md
Normal file
13
XAMPP_PHP-CGI_Windows_Code_Execution_Vulnerability.md
Normal file
@ -0,0 +1,13 @@
|
||||
|
||||
## XAMPP PHP-CGI Windows Code Execution Vulnerability
|
||||
|
||||
| **Vulnerability** | XAMPP PHP-CGI Windows Code Execution Vulnerability |
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | XAMPP Windows PHP-CGI 代码执行漏洞 |
|
||||
| **CVSS core** | 9.8 |
|
||||
| **FOFA Query** (click to view the results directly)| [ app="php-CGI"](https://en.fofa.info/result?qbase64=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%3D%3D)|
|
||||
| **Number of assets affected** | 7631 |
|
||||
| **Description** |PHP is a scripting language executed on the server side. There was a command execution vulnerability before version 8.3.8 of PHP. Due to the "Best-Fit Mapping" feature of Windows, non-ASCII characters may be incorrectly mapped to dash (-) when processing query strings, resulting in command line parameter parsing errors. When php_cgi runs on the Windows platform and the code page is in traditional Chinese, simplified Chinese or Japanese, the attacker can inject malicious parameters through a specific query string to execute arbitrary code.|
|
||||
| **Impact** | The attacker can inject malicious parameters through a specific query string to execute arbitrary code to take over the server.|
|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user