Описание
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
trusty/esm | not-affected | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/bionic | not-affected | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | not-affected | |
focal | not-affected | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | not-affected | |
mantic | DNE | |
noble | DNE | |
upstream | released | 8.1.28 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | not-affected | |
noble | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | not-affected | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
9.4 Critical
CVSS3
Связанные уязвимости
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before ...
Command injection via array-ish $command parameter of proc_open even if bypass_shell option enabled on Windows
9.4 Critical
CVSS3