Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-4577

Published: June 12, 2024Last modified: October 2, 2024

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Severity score breakdown

ParameterValue
Base score9.8
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Notes

This issue appears to be Windows-specific.

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSphp81Not affected (8.1.19-r0)
Streamphp83Not affected (8.3.4-r2)

References

ON THIS PAGE