PHP CGI Argument Injection Remote Code Execution

critical Web App Scanning Plugin ID 114300

Synopsis

PHP CGI Argument Injection Remote Code Execution

Description

PHP versions 5.0.0 < 8.1.29, 8.2.x < 8.2.20, 8.3.x < 8.3.8 is affected by a vulnerability allowing an unauthenticated attacker to execute remote code via a specially forged request only when PHP is installed with Apache2 and PHP-CGI on Windows with certain languages (code pages).

Solution

Upgrade to PHP version 8.1.29, 8.2.20, 8.3.8 or later.

See Also

https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html

https://www.php.net/ChangeLog-8.php#8.1.29

Plugin Details

Severity: Critical

ID: 114300

Type: remote

Published: 6/14/2024

Updated: 6/14/2024

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-4577

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-4577

Vulnerability Information

CPE: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: No known exploits are available

Patch Publication Date: 6/6/2024

Vulnerability Publication Date: 6/6/2024

CISA Known Exploited Vulnerability Due Dates: 7/3/2024

Reference Information

CVE: CVE-2024-4577

CWE: 78

OWASP: 2010-A1, 2013-A1, 2017-A1, 2021-A3

WASC: OS Commanding

CAPEC: 108, 15, 43, 6, 88

DISA STIG: APSC-DV-002510

HIPAA: 164.306(a)(1), 164.306(a)(2)

ISO: 27001-A.14.2.5

NIST: sp800_53-SI-10

OWASP API: 2019-API8

OWASP ASVS: 4.0.2-5.3.8

PCI-DSS: 3.2-6.5.1