2024-06-09 22:03:12 +00:00
{
"id" : "CVE-2024-4577" ,
"sourceIdentifier" : "security@php.net" ,
"published" : "2024-06-09T20:15:09.550" ,
2025-03-28 17:03:52 +00:00
"lastModified" : "2025-03-28T15:12:44.513" ,
2025-03-21 21:03:50 +00:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-06-09 22:03:12 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
2024-06-10 14:03:42 +00:00
} ,
{
"lang" : "es" ,
"value" : "En las versiones de PHP 8.1.* anteriores a 8.1.29, 8.2.* anteriores a 8.2.20, 8.3.* anteriores a 8.3.8, cuando se usa Apache y PHP-CGI en Windows, si el sistema est\u00e1 configurado para usar ciertas p\u00e1ginas de c\u00f3digos, Windows puede utilizar el comportamiento \"Mejor ajuste\" para reemplazar caracteres en la l\u00ednea de comando proporcionada a las funciones de la API de Win32. El m\u00f3dulo PHP CGI puede malinterpretar esos caracteres como opciones de PHP, lo que puede permitir a un usuario malintencionado pasar opciones al binario PHP que se est\u00e1 ejecutando y, por lo tanto, revelar el c\u00f3digo fuente de los scripts, ejecutar c\u00f3digo PHP arbitrario en el servidor, etc."
2024-06-09 22:03:12 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-06-10 14:03:42 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security@php.net" ,
"type" : "Secondary" ,
2024-06-10 14:03:42 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-06-10 14:03:42 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-06-10 14:03:42 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2024-06-09 22:03:12 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-06-09 22:03:12 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-06-09 22:03:12 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-06-09 22:03:12 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
2024-12-08 03:06:42 +00:00
"cisaExploitAdd" : "2024-06-12" ,
"cisaActionDue" : "2024-07-03" ,
"cisaRequiredAction" : "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable." ,
"cisaVulnerabilityName" : "PHP-CGI OS Command Injection Vulnerability" ,
2024-06-09 22:03:12 +00:00
"weaknesses" : [
2024-06-10 14:03:42 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security@php.net" ,
"type" : "Secondary" ,
2024-06-10 14:03:42 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
} ,
2024-06-09 22:03:12 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-06-09 22:03:12 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
2024-06-10 14:03:42 +00:00
"configurations" : [
{
2025-03-28 17:03:52 +00:00
"operator" : "AND" ,
2024-06-10 14:03:42 +00:00
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
2024-12-20 19:03:44 +00:00
"versionStartIncluding" : "8.1.0" ,
2024-06-10 14:03:42 +00:00
"versionEndExcluding" : "8.1.29" ,
2024-12-20 19:03:44 +00:00
"matchCriteriaId" : "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
2024-06-10 14:03:42 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2.0" ,
"versionEndExcluding" : "8.2.20" ,
"matchCriteriaId" : "A39988FF-D854-4277-9D66-6911AF371DD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.3.0" ,
"versionEndExcluding" : "8.3.8" ,
"matchCriteriaId" : "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
2025-03-28 17:03:52 +00:00
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
2024-06-10 14:03:42 +00:00
}
]
2024-06-21 12:03:14 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
2024-06-10 14:03:42 +00:00
}
] ,
2024-06-09 22:03:12 +00:00
"references" : [
2024-06-10 18:03:10 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/06/07/1" ,
2024-06-21 12:03:14 +00:00
"source" : "security@php.net" ,
"tags" : [
"Mailing List" ,
2024-12-20 19:03:44 +00:00
"Third Party Advisory"
2024-06-21 12:03:14 +00:00
]
2024-06-10 18:03:10 +00:00
} ,
2024-06-10 04:03:18 +00:00
{
"url" : "https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
2024-08-14 20:03:14 +00:00
"Press/Media Coverage" ,
2024-06-10 14:03:42 +00:00
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately" ,
"source" : "security@php.net" ,
"tags" : [
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://github.com/11whoami99/CVE-2024-4577" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit"
]
2024-06-10 04:03:18 +00:00
} ,
2024-06-09 22:03:12 +00:00
{
"url" : "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
2025-03-14 03:03:51 +00:00
"Broken Link" ,
"Exploit" ,
"Third Party Advisory"
2024-06-10 14:03:42 +00:00
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://github.com/rapid7/metasploit-framework/pull/19247" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
2024-08-14 20:03:14 +00:00
"Exploit" ,
2024-12-20 19:03:44 +00:00
"Issue Tracking" ,
"Patch"
2024-06-10 14:03:42 +00:00
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://github.com/watchtowrlabs/CVE-2024-4577" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://isc.sans.edu/diary/30994" ,
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
2024-06-12 04:03:12 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" ,
2024-06-21 12:03:14 +00:00
"source" : "security@php.net" ,
"tags" : [
2024-12-20 19:03:44 +00:00
"Mailing List"
2024-06-21 12:03:14 +00:00
]
2024-06-12 04:03:12 +00:00
} ,
2024-06-13 06:03:10 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" ,
2024-06-21 12:03:14 +00:00
"source" : "security@php.net" ,
"tags" : [
2024-12-20 19:03:44 +00:00
"Mailing List"
2024-06-21 12:03:14 +00:00
]
2024-06-13 06:03:10 +00:00
} ,
2024-06-21 20:03:11 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20240621-0008/" ,
2024-08-14 20:03:14 +00:00
"source" : "security@php.net" ,
"tags" : [
"Third Party Advisory"
]
2024-06-21 20:03:11 +00:00
} ,
2024-06-10 04:03:18 +00:00
{
"url" : "https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Third Party Advisory"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.1.29" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Release Notes"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.2.20" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Release Notes"
]
2024-06-10 04:03:18 +00:00
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.3.8" ,
2024-06-10 14:03:42 +00:00
"source" : "security@php.net" ,
"tags" : [
"Release Notes"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/06/07/1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
2024-12-20 19:03:44 +00:00
"Third Party Advisory"
2024-12-08 03:06:42 +00:00
]
} ,
{
"url" : "https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Press/Media Coverage" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
2025-03-14 03:03:51 +00:00
{
"url" : "https://blog.talosintelligence.com/new-persistent-attacks-japan/" ,
2025-03-21 21:03:50 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2025-03-14 03:03:51 +00:00
} ,
2024-12-08 03:06:42 +00:00
{
"url" : "https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/11whoami99/CVE-2024-4577" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
2025-03-14 03:03:51 +00:00
"Broken Link" ,
2024-12-20 19:03:44 +00:00
"Exploit" ,
"Third Party Advisory"
2024-12-08 03:06:42 +00:00
]
} ,
{
"url" : "https://github.com/rapid7/metasploit-framework/pull/19247" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
2024-12-20 19:03:44 +00:00
"Issue Tracking" ,
"Patch"
2024-12-08 03:06:42 +00:00
]
} ,
{
"url" : "https://github.com/watchtowrlabs/CVE-2024-4577" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://isc.sans.edu/diary/30994" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
2024-12-20 19:03:44 +00:00
"Mailing List"
2024-12-08 03:06:42 +00:00
]
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
2024-12-20 19:03:44 +00:00
"Mailing List"
2024-12-08 03:06:42 +00:00
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20240621-0008/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.1.29" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.2.20" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://www.php.net/ChangeLog-8.php#8.3.8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577" ,
2024-12-20 19:03:44 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577" ,
2024-12-20 19:03:44 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-06-09 22:03:12 +00:00
}
]
}