Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-5585

Published: June 12, 2024Last modified: October 2, 2024

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

Severity score breakdown

ParameterValue
Base score8.8
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredLOW
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Notes

This CVE appears to be Windows-specific.

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSphp81Not affected (8.1.19-r0)
Streamphp83Not affected (8.3.4-r2)

References

ON THIS PAGE