PHP-CGI Argument Injection CVE-2024-4577 (Direct Check)

critical Nessus Plugin ID 200464

Synopsis

An application installed on the remote host is affected by a argument injection vulnerability.

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use 'Best-Fit' behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server.

Solution

Upgrade to PHP version 8.1.29, 8.2.20, 8.3.8 or later.

See Also

http://www.nessus.org/u?3ea9a06c

Plugin Details

Severity: Critical

ID: 200464

File Name: php_argument_injection_cve-2024-4577.nbin

Version: 1.11

Type: remote

Family: CGI abuses

Published: 6/13/2024

Updated: 9/3/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-4577

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Required KB Items: www/PHP

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 6/6/2024

Vulnerability Publication Date: 5/4/2012

CISA Known Exploited Vulnerability Due Dates: 7/3/2024

Exploitable With

Metasploit (PHP CGI Argument Injection Remote Code Execution)

Reference Information

CVE: CVE-2024-4577

IAVA: 2024-A-0330