Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8927

Опубликовано: 07 окт. 2024
Источник: redhat
CVSS3: 7.5

Описание

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.

A flaw was found in PHP. The configuration directive cgi.force_redirect prevents anyone from calling PHP directly with a URL such as http://host.example/cgi-bin/php/secretdir/script.php. However, in certain uncommon configurations, an attacker may be able to bypass this restriction and access php-cgi directly.

Отчет

This vulnerability is rated as a moderate severity because the risk is limited, it poses a potential threat to the confidentiality of data.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 8php:8.0/phpWill not fix
Red Hat Enterprise Linux 8phpFixedRHSA-2024:1095111.12.2024
Red Hat Enterprise Linux 8phpFixedRHSA-2024:1095211.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2024:1094911.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2024:1095011.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2025:731513.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1220
https://bugzilla.redhat.com/show_bug.cgi?id=2317051php: cgi.force_redirect configuration is bypassable due to the environment variable collision

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
9 месяцев назад

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.

CVSS3: 7.5
nvd
9 месяцев назад

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.

CVSS3: 7.5
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
9 месяцев назад

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before ...

CVSS3: 5.3
github
9 месяцев назад

cgi.force_redirect configuration is bypassable due to the environment variable collision

7.5 High

CVSS3