CVE-2024-4577

critical

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

From the Tenable Blog

CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability
CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability

Published: 2024-06-07

Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution.

References

https://hackread.com/androxgh0st-botnet-iot-devices-exploit-vulnerabilities/

https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/

https://www.cloudsek.com/blog/mozi-resurfaces-as-androxgh0st-botnet-unraveling-the-latest-exploitation-wave

https://securelist.com/vulnerability-exploit-report-q2-2024/113455/

https://thehackernews.com/2024/08/hackers-exploit-php-vulnerability-to.html

https://symantec-enterprise-blogs.security.com/threat-intelligence/taiwan-malware-dns

https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure

https://www.imperva.com/blog/update-cve-2024-4577-quickly-weaponized-to-distribute-tellyouthepass-ransomware/

https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/

https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/

https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html

https://www.php.net/ChangeLog-8.php#8.3.8

https://www.php.net/ChangeLog-8.php#8.2.20

https://www.php.net/ChangeLog-8.php#8.1.29

https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/

https://security.netapp.com/advisory/ntap-20240621-0008/

https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/

https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/

https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/

https://isc.sans.edu/diary/30994

https://github.com/xcanwin/CVE-2024-4577-PHP-RCE

https://github.com/watchtowrlabs/CVE-2024-4577

https://github.com/rapid7/metasploit-framework/pull/19247

https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv

https://github.com/11whoami99/CVE-2024-4577

https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately

http://www.openwall.com/lists/oss-security/2024/06/07/1

Details

Source: Mitre, NVD

Published: 2024-06-09

Updated: 2024-12-20

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical