Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1874

Опубликовано: 09 апр. 2024
Источник: redhat
EPSS Средний

Описание

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

A command injection flaw was found in PHP, exclusive to Windows environments. This flaw allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function in specific conditions. The CreateProcess function implicitly uses cmd.exe when executing batch files, which has complicated parsing rules for arguments that have not fully escaped. It is possible to inject commands if an attacker can control part of the command arguments of the batch file.

Отчет

This vulnerability exclusively applies to applications running on Windows.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 8php:7.4/phpNot affected
Red Hat Enterprise Linux 8php:8.0/phpNot affected
Red Hat Enterprise Linux 8php:8.2/phpNot affected
Red Hat Enterprise Linux 9phpNot affected
Red Hat Enterprise Linux 9php:8.1/phpNot affected
Red Hat Enterprise Linux 9php:8.2/phpNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2267262php: Fail to Escape Arguments Properly in Microsoft Windows

EPSS

Процентиль: 98%
0.54606
Средний

Связанные уязвимости

CVSS3: 9.4
ubuntu
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

CVSS3: 9.4
nvd
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

CVSS3: 9.4
msrc
около 1 года назад

Описание отсутствует

CVSS3: 9.4
debian
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before ...

CVSS3: 9.4
github
около 1 года назад

Command injection via array-ish $command parameter of proc_open even if bypass_shell option enabled on Windows

EPSS

Процентиль: 98%
0.54606
Средний