Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-1874

Published: April 12, 2024Last modified: April 23, 2024

Description

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. 

Severity score breakdown

ParameterValue
Base score9.4
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactLOW
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSphp81Fixed (8.1.28-r0)
Streamphp83Fixed (8.3.6-r0)

References

ON THIS PAGE