Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-1874

Опубликовано: 29 апр. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 9.4

Описание

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

trusty/esm

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

not-affected

focal

not-affected

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

mantic

DNE

noble

DNE

upstream

released

8.1.28

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

not-affected

noble

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

not-affected

trusty

DNE

trusty/esm

DNE

Показывать по

9.4 Critical

CVSS3

Связанные уязвимости

redhat
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

CVSS3: 9.4
nvd
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

CVSS3: 9.4
msrc
около 1 года назад

Описание отсутствует

CVSS3: 9.4
debian
около 1 года назад

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before ...

CVSS3: 9.4
github
около 1 года назад

Command injection via array-ish $command parameter of proc_open even if bypass_shell option enabled on Windows

9.4 Critical

CVSS3

Уязвимость CVE-2024-1874